IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
2
Indexing of Volume 2, Issue 6
S.No. Paper Title Organization Page No.
1
An Insight into the Energy Efficiency based
Image Compression on Handheld Devices M. Jyothirmai
J.N.T.U. kakinada, Andhra
Pradesh 11
2 An Improved Hierarchical Clustering for
Information Retrieval System Ila Shrivastava, Rahul Moriwal
Acropolis Institute of
Technology and Research,
Indore (Madhya Pradesh)
12
3 The Gateway Based Adaptive Gateway
Discovery Scheme in Mobile Ad-hoc Network Ruchik N. Jani
Government Polytechnic,
Rajkot 13
4
Recharging of WSN Nodes based on Polling
Mac Protocol for Lifetime Maximization and
Reliability Sunita H. Bajaj, Samiksha M. Bharne
B.I.T., Ballarpur 13
5
Re-Think on Critical Successful Factors of E-
learning Implementation in India based
Corporates Shangeerthana G.V., Chandrasekar K.
Alagappa University, Tamil
Nadu 14
6 Stress Management Bh. L. Mohanraju, K. Neelima
DNR School of Business
Management, Bhimavaram. 14
7
Role of Twitter as a Digital News Engagement
Resource for Political Awareness of Journalists
in India Subi Chaturvedi, Jaijit Bhattacharya
D.M.S., .I.I.T.D. & Partner –
K.P.M.G. 15
8 Phyto-Toxic Effect of Chromium of Cow Pea
(Vigna Unguiculata (l.) Walp.) K. Prakash, T. Ravimycin, P. Thamizhiniyan
Annamalai University,
Annamalai Nagar 15
9
Educational Data Mining: Recognizing and
Forming Groups of Competent Students For
Contests Ashok M.V., Apoorva A., Dr. G. Suganthis
Women’s Christian College,
Nagrcoil, Tamil Nadu 16
10 Machine Learning and SOA Based Building
Management System
Sandhiya. B.
Kathir College of
Engineering, Coimbatore 16
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
3
11 Effect of Interference of UMTS and WLAN
during Handoff Ramandeep Sethi, Pankaj Sharma, Puneet Jain
Punjab Technical University,
Punjab 17
12 Effect of Varying Source Node, Relay Node and
Mobility in MANET Lovepreet Singh, Pankaj Sharma, Puneet Jain
Punjab Technical University,
Punjab 17
13 Improved Color Image Steganographic
Technique in Transform Domain K.S. Sadasiva Rao, Dr A. Damodaram
Sri Indu Institute of
Engineering and
Technology, Telangana
18
14
Physicochemical Studies on Schiff Bases
Derived from Substituted Coumarins with
Substituted Diamines in Aqueous-Alcohol
Medium Uma Desai, Suresh
Ballari Institute of
Technology & Management,
Karnataka
17
15 Class Imbalance Problem in Data Mining using
Probabilistic Approach Disha Gupta, Reetu Gupta, Prashant Khobragade
R.T.M.N.U., Nagpur 19
16 A Review on Wireless Transport Layer Security Chandan Sharma
Career Point University,
Himachal Pardesh 19
17 Antibacterial and Antifungal Activity from Seed
Extracts Of Peganum Harmala Jayaprakash Chinnappan, Veeran Mohanraj
Sri Ramakrishna Mission
Vidyalaya College of Arts
and Science, Coimbatore
20
18
An Approach for Reduction in Power
Consumption in Low Voltage Dropout
Regulator Shivani. S. Tantarpale, Ms. Archana O. Vyas
G.H.Raisoni College of
Engineering and
Management, Amravati
20
19
Optimization of Cycle Time through Mastercam
Virtual Simulation and Four Axis CNC Milling
Machining Of Camshaft Prasanth Navaneetham, V.G. Umasekar, Bibin Baby
S.R.M. University, Chennai 21
20 Risk Analysis in Construction Scheduling Musale Kunal Rajendra, Aher M.C.
N.D.M.V.P.’S K.B.T.C.O.E.,
Nashik 22
21 Review of VANET Routing in Opportunistic
Environment Dhanveer Kaur, Harwant Singh Arri
Lovely Professional
University, Phagwara 23
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
4
22 Review of VANET Security on Trust Base Diljot Kaur, Simarjit Singh Malhi
Lovely Professional
University, Phagwara 23
23
Characteristic Study and Enhancement of
Mechanical Properties of Al2024 Gray Cast
Iron Powder Reinforced MMC by Heat
Treatment Manikanta M., S.S. Sharma, Sathish Rao U.
Manipal Institute of
Technology, Karnataka 24
24
Design of Steam Piping System for Dryers in
Paper Machine and Checking its Sustainability
through Finite Element Analysis using Caesar
II Mohammad Taseem Rafique Kadagaonkar, Milind S. Yadav
Finolex Academy of
Management and
Technology, Ratnagiri
25
25 A Comparative Study of Gender and Youth
between Rural and Urban S. Ananda
S. J. M. Arts, Commerce,
Science College, Karnataka 26
26 Structural and Vibrational Analysis of Wheel
Rim P. Dileepkumar, G. Ramesh, G. Suresh
V.E.M.U. Institute of
Technology, A.P. 27
27
Implementation of Anonymous and Secure
Communication System with Group Signatures:
A Review Vaibhav P. Thakare, Chetan J. Shelke
P.R. Patil College of
Engineering & Technology,
Amravati
28
28 Standardisation (Phytotoxicity) of Germination
Media (Paper) for Mustard Seedling Evaluation Amol C. Vikhe
Ajeet Seeds Private Limited
Chitegaon, Aurangabad 28
29 Novel Technique of Clustering based Reac-In
Routing with Probabilistic Approach Amandeep Kaur, Harpreet Kaur
Bahra Group of Institutes,
Patiala 29
30
Project Success, It’s Performance Evaluation
and Prediction for Transmission Construction
Project Pankaj Purushottam Chandwadkar, Prof. R.V. Devalkar
K.B.T.C.O.E, Nashik 30
31
Applying the Fuzzy Critical Path Method to
Manufacturing Tugboat K. Usha Madhuri, K. Chandan
Acharya Nagarjuna
University, Guntur 31
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
5
32
Celebrities and Social Cause- Detailed Analysis
of Importance of Choosing a Celebrity Followed
by Pulse Polio Advertisement
Radhika Wadhera
Pacific Academy of Higher
Education and Research
University, Udaipur
31
33 Comparative Study of Successive Factors of
Residential and Commercial Project In Nashik Pushkar S. Kothawade, Mrs. Madhura Aher
N.D.M.V.P.’S K.B.T.C.O.E. 32
34
Detailed Modelling of Permanent Magnet
Synchronous Motor (PMSM) for Electrical
Forklifts part-IV Designing of Subsystem Model
of PMSM Block Aaditya Khare, Dr. Smita Shrivastava
G.R.K.I.S.T. Jabalpur, 32
35 Brain Controlled Prosthetic Leg Manu R., Mithu Markose, Tonio P. Thomas
Federal Institute of Science
and Technology, Kerala 33
36 Impact of HR Practices on Employees Job
Satisfaction Deepesh Kumar Yadav, Dr. Jaya Yadav
Amity University, Noida 33
37
Optimization, Analysis and Comparison of 4 and
16 bit Carry look Ahead Adders using 0.3μm
Process Technology for SCMOS Ruchi Rai, Prof. L.N. Gahalod, Dr. Rita Jain
L.N.C.T., Bhopal 34
38
Review on: Heterogeneous Leach in 3-
Dimensional Wireless Sensor Network using
Gateway Vandana Jain, Amanpreet Singh Dhanoa
Rayat Bahra University 34
39 Digital Photo Sensor Able to Differentiate up to
Three Light Intensity Bands and its Applications Akash Verma, Hikmat Beig, Vijay Kumar Yadav, Vivek Singh
I.E.T., Lucknow 35
40
Comparative Study of Manure Produced from
Wastes Gaurav Singh, Akhil Kumar Gupta, Divyank Tiwari, Matulya
Mani
I.E.T., LUCKNOW 35
41
Innovation of Mobile, Mobile Commerce and
Mobile Apps as Disrupted the Businesses of
Small Units R. Parvathi, Dr. Veena Angadi, Gattamraju Sreelatha, Dr.
Gopala Krishana
BES Degree Evening College 36
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
6
42
Response of Jhelum Rice Variety to Different
Crop Management Practices towards
Morphological and Yield Parameters in
Temperate Kashmir Valley Javaid Ahmad Wani, Dr. Amit Sharma
Dr. C.V. Raman University,
Bilaspur 37
43
Synthesis and Characterization of O-Alkyl ,O-
Aryl and O-Cycloalkyl Trithiophosphato
Derivatives of Lanthanum (III) Chloride and
their Adduct with Nitrogen Donar Bases Rafia Ahmad, U.N.Tripath
M.L.K.P.G. College,
Balrampur 38
44 Gas Sensor Array for Quantitative Detection of
Gas Mixture Pauroosh Kaushal, Nirlipta R. Mohanty
D.Y. Patil College of
Engineering, Akurdi 38
45
A Study on Investors’ Expectations on Mutual
Funds Offered by Share Khan with Reference to
Amravati City, Maharashtra Prajakta Yawalkar
Maharashtra Institute of
Technology, Pune 39
46 Medical Image Watermarking with Patient
Details as Watermark Sumit Kumar Srivastava, Harikesh Pandey
R.I.T.M., Lucknow 39
47
Analysing of the Media and Public Tendencies
in Twitter Mr. Ashish Laxman Gaikwad, Mr. Sumit Suresh Shendkar,
Mr. Mahesh Tukaram Atpadkar
Savitribai Phule Pune
University 40
48 Design of Gating System for Connecting Hinge
by Traditional and Software Method Ranjeet Mithari, Mahesh Shinge, Pravin Rajigare
Bharati Vidyapeeth’s
College of Engineering,
Kolhapur
41
49
Coping Strategies of Young Married Women in
Banking Sector with Reference to Health and
Family Ms Mugdha Sehgal, Pallavi Ahuja, Dr. J.K. Batra
Jagannath International
Management School,
Kalkaji, Affiliated to GGSIPU
42
50 A Study on Adoption of M-Banking Services by
Private Bank Customers in New Delhi Ms. Jasleen Rana
Jagannath International
Management School, Kalkaji 43
51
Intelligent Real Time Data Scan Module for
Improved System Performance of Distributed
Flight Test Instrumentation System Architecture Madhusudana R.V., Vijay V. Patel, Prasad N.N.S.S.R.K.
Aeronautical Development
Agency 44
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
7
52 Hybrid Image Compression using DCT and
Fuzzy Logic Upendra Kumar Srivastav, Harikesh Pandey
R.I.T.M., Lucknow, U.P. 45
53 Self- Confidence among Dyscalculic Elementary
School Students of Shimla District Jeewan Jyoti
Department of Education
H.P.U., Shimla 45
54 An Enhanced Image Descriptor Algorithm for
Image Retrieval using SIFT – PCA Dr. R. Malini
46
55
A Study on Customer Attitude Towards Online
Shopping in India and its Impact: With Special
Reference to Solapur City Prof. Pritam P. Kothari, Prof. Shivganga S. Maindargi
Bharati Vidyapeeth
University,Pune,
A.K.I.M.S.S. Solapur
46
56 k-Means Clustering based Lexicon Analytical
Model for Multi-Source News Classification Kamaldeep kaur, Maninder Kaur
Doaba Institute of
Engineering & Technology,
Kharar
47
57
Hall Current Effects on Unsteady MHD
Convective Flow of Heat Generating/Absorbing
Fluid through Porous Medium in a Rotating
Parallel Plate Channel Dr. P. Sulochana
Intell Engineering College,
Andhra Pradesh 48
58 Growth in Agricultural Resource USE: An
Application of Exponential Growth Curve. Prince Singh, Dr Manjeet Jakha
N.I.I.L.M. University,
Kaithal, Haryana 49
59 Data Mining : Text Classification System for
Classifying Abstracts of Research Papers Shirdi Wazeed Baba, Reddi Sanjeev Kumar
Indian Institute of
Information Technology,
Design and Manufacturing,
Jabalpur, (M.P.)
50
60
Multivariate Indoor Scene Recognition using
the Object Level Analysis with SVM
Classification Neetu Dhingra
Patiala Institute of
Engineering and
Technology, Punjab
50
61 Microwave Welding using Stainless Steel
Grades – A Short Survey Valsaraj T.S., Mr. Sathish Kumar
S.N.S. College of
Engineering, Coimbatore 51
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
8
62
On the Principle of Exchange of Stabilities in
the Magnetohydro Dynamic Benard Problem
with Variable Gravity by Positive Operator
Method. Pushap Lata Sharma
Rajiv Gandhi Govt. Degree
College, Chaura Maidan
Shimla-4 (H.P.)
51
63 Development of Multi Objective Techniques-A
Case Study of Punjab and Haryana Prince Singh, Dr Manjeet Jakha
N.I.I.L.M. University,
Kaithal, Haryana 52
64 A Review of the Research on Aviation Risk
Identification Kaustav Jyoti Borah, Mohan Kantipudi
Gauhati University, Assam 53
65 Implementation of Just-in-time in an Enterprise Kiran Mahendrabhai Patel, Karan M. Patel, Rohan S. Sanap
Genba Sopanrao Moze
C.O.E. 53
66 On the Class of (K-N) Quasi-n-Normal
Operators on Hilbert Space Sivakumar N., Bavithra V.
Hindusthan College of Arts
and Science, Tamil Nadu 54
67 On Parahyponormal and Quasi
Parahyponormal Operators Sivakumar N., Dhivya G.
Hindusthan College of Arts
and Science, Tamil Nadu 54
68
A Study about the Microfinance Models and
Role of Financial Institution in Empowering
Rural Finance: – An overview. Ahsan Ul Haq, Dr. Javed Iqbal
B.G.S.B.U., Rajouri 55
69 Response of Bacterial Isolates to Various
Antibiotics Isolated from Petroleum Spilled Soil. Ritu Sharma
M.D.S. University,
Ajmer,Rajasthan 56
70 Bioremediation of Petroleum Products through
Bacterial Isolates. Ritu Sharma
M.D.S. University, Ajmer 56
71 Offloading in Mobile Cloud Computing by
Exception Maximization Algorithm Samriti Goyal, Bhartii Grover
Gurukul Vidyapeeth
Institute of Engineering and
Technology, Punjab
57
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
9
72
Employee Satisfaction of Safety and Security
Measures in Knitted Garment Apparels Pvt(Ltd),
Tirupur, (Tamil Nadu, India). Dr. B. Anitha Rani
J. J. College of Arts &
Science(Autonomous)-
Pudukkottai
57
73
A Study on Work Value Perceptions of Women
Employees in Indian Postal Department with
Special Reference to Tamil Nadu State. DR. K. Gomathi
J. J. College of Arts &
Science(Autonomous)-
Pudukkottai
58
74 Novel Clustering based Routing Approach in
MANET by Flower Pollination Algorithm Karamjeet Kaur, Harpreet Kaur
Rayat Bahra Group of
Institutes, Patiala 59
75 Golden Ratio Associated with Rogers-
Ramanujan Identities Dr. Vandana N. Purav
P. D. Karkhanis College of
Arts and Commerce,
Ambarnath
59
76 Optimization in Communication Routing: An
Introduction to Optimal Control Kaustav Jyoti Borah, Jutika Borah
Gauhati University, Assam 60
77 Implementation of Plagiarism Detection Tool in
JAVA Attinderpal Singh
Guru Nanak Dev University,
Amritsar 60
78 Efficient Reception of Packets using Zigbee
Protocol Wireless Sensor Network Khursheed Ahmad Rather, Aashish Gagneja, Navjot Kaur
P.E.C., Panchkula,
Kurukshetra 61
79 A Secure Data Aggregation Mechanism in
Wireless Sensor Network Sandhya Sehrawat, Dr. DINESH SINGH
D.C.R.U.S.T., Murthal,
Haryana 62
80 Optimizing Channel Estimation for SCFDMA Priyanka Malhotra, Garima Saini
N.I.T.T.T.R., Chandigarh 62
81 Behavior Analysis of OSPF and ISIS Routing
Protocols with Service Provider Network Vikasdeep Kaur, Harpreet Kaur, Jaspreet Kaur
Bahra Group of Institute,
Punjab 63
82 Proposed Approach on CSTR with PID Ramandeep Kaur, Jaspreet Kaur
Chandigarh University 63
83 Comparison of State Observer Design
Algorithms for DC Servo Motor Systems Kaustav Jyoti Borah, Jutika Borah
Gauhati University, Assam 64
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
10
84 Automated Vehicle Detection and Classification
with Probabilistic Neural Network Ramanpreet Kaur, Meenu Talwar
Chandigarh Group of
Colleges, Landran,
Chandigarh
64
85 A Review in Cloud Computing Security using
Steganography Ataussamad, Dr. Shiva Prakash
Madan Mohan Malaviya
University of Technology,
Gorakhpur, U.P.
65
86 Survey on Dynamic Resource Allocation
Schemes in Cloud Environment: A Review Roshni Singh, Dr. Shiva Prakash
Madan Mohan Malaviya
University of Technology,
Gorakhpur, U.P.
65
87 Detection and Mitigation of Botnet through
Machine Learning in MANET Mariya Ameer, Aashish Gagneja, Navjot Kaur
P.E.C., Panchkula,
Kurukshetra University 66
88 Protocol Enhancement of Vehicle Collision
Avoidance System in Network Mr. Insha Mushtaq, Aashish Gagneja, Navjot Kaur
P.E.C., Panchkula,
Kurukshetra University 67
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
11
An Insight into the Energy Efficiency based Image Compression on Handheld
Devices
M. Jyothirmai
J.N.T.U. Kakinada, Andhra Pradesh
Abstract: Transmission of facts like voice, textual content, photograph and video has many
drawbacks like confined statistics degree of networks, noise in the channel, battery constraints of
the gadgets and many others. This paper addresses the power and information degree drawbacks
of pictures in digital conversation. The intention is to supply a comparison of the modern
techniques supported the number of information within the snap shots, minimizing the strength
needed for communication and also the obtainable transmission bandwidths. The fashions in
comparison are the compression algorithms for mobile gadgets to cut back the transmission
power of snap shots through wireless networks and adaptive facts codec for still photos so one
can appreciably decrease the energy needed for Wi-Fi photograph communication. The rule is
applied earlier than transmission images and is obvious to users. We will be predisposed to
consequently use publically obtainable databases for our evaluation of power low-budget
compression method.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
12
An Improved Hierarchical Clustering for Information Retrieval System
Ila Shrivastava, Rahul Moriwal
Acropolis Institute of Technology and Research, Indore (Madhya Pradesh)
Abstract: Now in these days the information need is increasing rapidly in our day to day life
therefore a large number of users are accessing data from search engine. The search engines are
composed with three major components user query interface, search algorithm and the ranking
process. During search process the system evaluate the user input query and the database
documents according to best fit documents are retrieved. The retrieved document is then ranked
according to the user query relevance thus most near document of the user query is listed first.
The available technique are provides the ranked listing of documents. In this presented work first
the recently developed text document retrieval models are evaluated and then after a traditional
model of document retrieval is enhanced with help of supervised classification technique. The
proposed data model of the document search first finds the document’s word probability using
the Bayesian classification approach then after the data is normalized to find the similar length of
text document features. These document features are used to make training of neural network.
The neural network processes the input training features and makes training for the documents
pattern. This data model is used to predict the user input data patterns from the existing set of
data. The implementation of the proposed technique is performed using the JAVA development
technology after implementation of the desired document retrieval technique the performance of
the system is estimated in terms of accuracy, error rate, memory consumption and the time
consumption. According to the evaluated results the performance of the algorithm is found more
optimum. Thus the given model is more adoptive as compared to the traditional approaches
available.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
13
The Gateway Based Adaptive Gateway Discovery Scheme in Mobile Ad-hoc
Network
Ruchik N. Jani
Government Polytechnic, Rajkot
Abstract: From last two decades wireless networks are gaining popularity and have been widely
used. Mobile adhoc network is a great solution to the current need of low-cost, on-demand,
autonomous and infrastructure-less network which is highly portable, mobile and temporary in
nature. To connect MANET to fixed network, any node in MANET should be configured as a
gateway. Node that wants connectivity needs to discover present gateways in MANET. To
reduce overhead, previous schemes tune Time to Live and/or Advertisement Interval of gateway
advertisement packets based on total source nodes and/or mobility of nodes in MANET. As
discussed in [4], it is also possible to consider number of gateways in MANET to adapt the
discovery procedure. Proposed scheme does the same. It is found that the new scheme shows
better results in terms of less routing overhead with same Delivery Ratio and End-to-End Delay,
compared to proactive and hybrid gateway discovery schemes.
Read Full Paper
Recharging of WSN Nodes based on Polling Mac Protocol for Lifetime
Maximization and Reliability
Sunita H. Bajaj, Samiksha M. Bharne
B.I.T., Ballarpur
Abstract: Wireless sensor networks on energy received from radio frequency devices. Since the
sensor nodes are always in the process of sensing, energy outage is the common phenomenon
among them. In order to reduce this outage of energy, we have proposed Medium Access
Control (MAC) protocol. This protocol follows round robin scheduling algorithm. The nodes
which are on the verge of outage of energy send recharging request to the master node. During
this process, the nodes which are in the way of master node and the requesting node they also
hear and repeat the recharging request until the master node replies with a recharging pulse. The
performance of the system is evaluated using a probabilistic energy expenditure model. Our
results show that the protocol designed gives uninterrupted working networks despite of varying
conditions.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
14
Re-Think on Critical Successful Factors of E-learning Implementation in India
based Corporates
Shangeerthana G.V., Chandrasekar K.
Alagappa University, Tamil Nadu
Abstract: This paper provides an insight about the key factors that can be re-considered for
implementing E-Learning in any of the India based Corporate towards its success by overcoming
the failures, which can be accomplished by means of setting light to Employee’s Learning
strategy (in other words, E-Learning:- Employees Learning in Corporate).
Read Full Paper
Stress Management
Bh. L. Mohanraju, K. Neelima
D.N.R. School of Business Management, Bhimavaram.
Abstract: Simply knowing the range of possible preventive stress management methods does not
necessarily lead to effective prevention of distress. This chapter reviews preventive stress
management programs (organizational/individual) and presents a framework for the
implementation of such programs. At the organizational level, management training programs
for all levels of management, organizational development activities, internal or external
consultants, and ad hoc task forces can be useful in introducing preventive stress management
activities. At the individual level, medical or health departments, stress management programs,
fitness programs, and comprehensive health promotion programs can each be vehicles for
bringing individual stress management techniques into the organization. Implementing
preventive stress management in an organization requires (a) organizational stress diagnosis, (b)
planning for prevention, (c) organizational and individual action, and (d) outcome evaluation.
These functions form an iterative model for implementing preventive stress management that is
intended to foster continuing growth and development of the organization and the individuals
within it. (PsycINFO Database Record (c) 2010 APA, all rights reserved).
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
15
Role of Twitter as a Digital News Engagement Resource for Political Awareness of
Journalists in India
Subi Chaturvedi, Jaijit Bhattacharya
IIT, Delhi
Abstract: News on social media has outgrown television & radio news with instant update &
feedback options; turning ‘passive audience’ into ‘active participants’ in the news making &
news sharing process. Emergence of Twitter as a citizen engagement platform has been
beneficial for journalists who use it for reading news & analyzing the latest Twitter trends as
well as to acquire news worthy material for profitable news reporting. The paper foregrounds
this dynamic function as well as critiques the role of Twitter as a participatory news resource for
journalists’ engagement with respect to political news in the nation and across the world. Twitter
has become the informative site with over 320 million Twitterati (PEW Report, 2015). The
primary focus of this paper is to understand how Twitter has developed as the most used social
networking site by the Journalists for accessing and sharing Political News and to explore the
motivations of Journalists for using Twitter for the purpose of political news sharing and
participation in news related discussions.
Read Full Paper
Phyto-Toxic Effect of Chromium of Cow Pea (Vigna Unguiculata (l.) Walp.)
K. Prakash, T. Ravimycin, P. Thamizhiniyan
Annamalai University, Annamalai Nagar
Abstract: A laboratory experiment was conducted to determine the phototoxic effect of
[Chromium (Cr) Potassium dichromate (K2 Cr2 O7)] on seed germination and seedling growth
of cow pea [Vigna unguiculata (L.) Walp.]. The seeds were treated under 5, 25, 50, 75, 100, 125
and 150 ppm of Cr concentration solutions individually. Each treatment was replicated thrice in a
randomized block design. Observations were complete on Germination Percentage, Root and
Shoot Length, Number of Leaves, Total Leaf Area, Fresh and Dry Weights of seedling. And
Phytotoxicity, Tolerance Index, Vigour Index and pigments content such as Chlorophyll ‘a’,
Chlorophyll ‘b’, Total Chlorophyll and carotenoid content of cow pea seedlings at 14th days of
seedlings. Among the results gradual increase in Cr concentration under different treatments
significantly leads to inhibition of seed germination and other growth parameters. Percentage of
Phytotoxicity showed an increasing trend with gradual increase in Cr concentration for the cow
pea seedlings. Maximum inhibition in all growth parameters and pigments content were
recorded.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
16
Educational Data Mining: Recognizing and Forming Groups of Competent Students
For Contests
Ashok M.V., Apoorva A., Dr. G. Suganthi
Teachers Academy, Bangalore
Abstract: Educational Data Mining is an area where in a combination of techniques such as data
mining, machine Learning and statistics, is applied on educational data to get valuable
information. The main objective is to recognize competent students based on marks are using
clustering (X-means algorithm); then the subjects studied by them are classified into different
categories and finally better combination of students as groups or teams are chosen to represent
college for contests using association rules. To assess the performance of the proposed model, a
student dataset of MCA from a college in Bangalore were collected for the study as a synthetic
data. The accuracy of the results obtained from the proposed model was found to be promising. It
was found from the study that 3 groups of 2 teams per group emerged as better combinations.
Read Full Paper
Machine Learning and SOA Based Building Management System
Sandhiya. B.
Kathir College of Engineering, Coimbatore
Abstract: In order to attain energy saving with efficiency and supply good services automatically
for users, the design of a sensible energy observance and management system using the
Microsoft neural network and computationally non tolling formula is projected in this paper. By
monitoring the ability consumption data, surroundings data and users’ scenario data, the system
supported the design will calculate the proportion of wasted energy consumption supported the
energy consumption data point, give sensible services based on the person-device interaction,
and forecast the energy consumption supported the user energy consumption behaviors. The
system is combined with cloud computing for data storage and processing. This document
illustrates propose and execution of the system structural design.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
17
Effect of Interference of UMTS and WLAN during Handoff
Ramandeep Sethi, Pankaj Sharma, Puneet Jain
Punjab Technical University, Punjab
Abstract: In this paper the performance of WLAN is analyzed in the presences of UMTS nodes.
To analyze this interference UMTS are nodes are moving using different trajectories. While
moving UMTS nodes handoff (soft and hard) techniques are used in this paper. To analyze this
effect OPNET modeler is used. The performance is compared In terms of load, media access
delay and packet delay variation. The result shows that the performance of soft handoff is better
than hard handoff.
Read Full Paper
Effect of Varying Source Node, Relay Node and Mobility in MANET
Lovepreet Singh, Pankaj Sharma, Puneet Jain
Punjab Technical University, Punjab
Abstract: In this paper the effect of entering different routing protocol in a network is analyzed.
To analyze this effect number of nodes are vary from 25 to 65 nodes. In this paper the 25 nodes
are move at low speed and 65 nodes are moving at high speed. To analyze this effect opnet
modeler 14.5 is used. The performance is compared in terms of throughput, load and media
access delay. Results show that when only adv. is used performance is good when other
protocols enter into the network then performance decrease.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
18
Improved Color Image Steganographic Technique in Transform Domain
K.S. Sadasiva Rao, Dr A. Damodaram
Sri Indu Institute of Engineering and Technology, Telangana
Abstract: Steganography is the process of embedding original message bits on some carrier file.
The carrier file may be text file, image file, audio file or video file etc. If that carrier file is an
image file, then that technique is called Image steganography [1]. If color image is used as a
carrier file to embed data bits, then that type of steganography technique is called as color image
steganography [7]. In this proposed work, embedding the original message bits in the transform
domain of the carrier color image without considering the green plane, hence it is resulting in
high quality stego image. Hence this technique is called as improved color image steganography
technique in transform domain. Here in this paper, DCT (Discrete Cosine Transform) technique
has been used.
Read Full Paper
Physicochemical Studies on Schiff Bases Derived from Substituted Coumarins with
Substituted Diamines in Aqueous-Alcohol Medium
Uma Desai, Suresh
Ballari Institute of Technology & Management, Ballari, Karnataka
Abstract: Schiff bases derived from substituted coumarins with substituted diamines were
synthesized by cyclo-condensation. Proton-ligand ionization constants and metal-ligand stability
constants at constant ionic strength in aqueous-alcohol medium (50/50% V/V) were evaluated
using Irving-Rossotti method. The ligands exhibit pKa values around 11.5 due to the phenolic –
OH group. The metal ligand stability constants with Cu (II), Co (II), Ni (II), Zn (II), Cd (II) and
Hg (II) were also determined. The effects of substitutions on the stability constants were studied.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
19
Class Imbalance Problem in Data Mining using Probabilistic Approach
Disha Gupta, Reetu Gupta, Prashant Khobragade
R.T.M.N.U., Nagpur
Abstract: Class imbalance problem are raised when one class having maximum number of
examples than other classes. The classical classifiers of balance datasets cannot deal with the
class imbalance problem because they pay more attention to the majority class. The main
drawback associated with it majority class is loss of important information. The Class imbalance
problem is a difficult due to the amount and nature of data. This paper focuses different methods
of class imbalance problem. It is been considered the majority class to achieve the class
imbalanced problem. This paper mainly focuses the minority class sample to achieve the
problem and proposed method for class imbalance problem using minority sample data. The
oversampling and under sampling both concept were used to identify the correct class label of
the sample using probabilistic approach, the main objective of this paper, to proposed method to
minimize the misclassification rate of minority class sample, balance and classify the data more
accurately thereby improving the performance of classifier.
Read Full Paper
A Review on Wireless Transport Layer Security
Chandan Sharma
Career Point University, Hamirpur, H.P.
Abstract: Wireless Application Protocol (WAP) is one of the technical standards for information
over a mobile wireless network. Mobile devices such as mobile phones that use the protocol have
a WAP browser as a web browser. WTLS (wireless transport layer security) inherited from TLS
(Transport Layer Security). WTLS uses similar semantics adapted for a low bandwidth mobile
device. As compared to TLS main changes are compressed data structures where possible packet
sizes are reduced by using bit-fields, discarding redundancy and truncating some cryptographic
elements. WTLS defines a compressed certificate format. This broadly follows the X.509 v3
certificate structure, but uses smaller data structures. Packet based design TLS is designed for
use over a data stream. WTLS adapts that design to be more appropriate on a packet based
network. WTLS design is based on a requirement that it be possible to use a packet network such
as SMS as a data transport. There are number of WTLS security issues. WTLS processing more
is fast as compared to using SSL. So it is suitable for wireless system. WTLS uses modern
cryptography tools to enhance security. WTLS can provide different level of security for privacy,
data integrity and authentications.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
20
Antibacterial and Antifungal Activity from Seed Extracts Of Peganum Harmala
Jayaprakash Chinnappan, Veeran Mohanraj
School of Life Sciences, Bharathiar University, Coimbatore
Abstract: The aim of the study was to determine the strong antimicrobial and antifungal activity
from the extracts of Peganum Harmala plant species by solvent extraction procedure. P. harmala
seeds extract contains several important alkaloids such an important Oxamide compound was
used for this study. Extracted product was isolated, purified and identified by Thin Layer
Chromatography, UV-VIS Spectroscopy, FT-IR Spectroscopy and 1H-NMR, 13C-NMR
Spectroscopy. Finally, the isolated compound Oxamide activity was checked and proved through
the Candida albicans, Klebsiella pneumonia and Pseudomonas aeruginosa with MIC studies.
Read Full Paper
An Approach for Reduction in Power Consumption in Low Voltage Dropout
Regulator
Shivani. S. Tantarpale, Ms. Archana O. Vyas
G.H.Raisoni College of Engineering and Management, Amravati
Abstract: A low-dropout or LDO regulator is a DC linear voltage regulator which can control the
output voltage even when the supply voltage is very close to the output voltage. The advantages
of a low dropout voltage regulator include the absence of switching noise ( as no switching takes
place), smaller device size ( as neither large inductors nor transformers are needed), and greater
design simplicity (usually consists of a reference, an amplifier and a pass element). A significant
adiabatic logic with 180 nm CMOS technology is proposed to reduce impact of power supply
reductions well as a simple symmetric operational trans conductance amplifier is used as the
error amplifier (EA), with a current splitting method adopted to increase the gain and also
improves the bandwidth of the LDO regulator.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
21
Optimization of Cycle Time through Mastercam Virtual Simulation and Four Axis
CNC Milling Machining Of Camshaft
Prasanth Navaneetham, V.G. Umasekar, Bibin Baby
S.R.M. University, Chennai
Abstract: In olden days, the complexity of fabricating the mechanical components is higher and
time consuming. Manufacturing industries normally use conventional methods like casting and
forging process to shape components and use CNC machines to achieve final dimensions within
the required tolerance. The difficulty in making components can be minimized by introducing
the techniques for reduced setup time reduced machining time for increase in productivity and
increase in accuracy and surface finish as a result of using 5- axis CNC VMC milling machining
setup. But prior to start machining, a virtual simulation of the entire operations is to be carried
out to check, verify and rectify the occurrence of collision, and the application of suitable
parameters to achieve reduced cycle time. And this virtual simulation can be carried out through
Mastercam software. This paper is focused on 4-axis finishing process of camshaft using 5-axis
CNC VMC milling machine. This work involves geometric modeling of camshaft using Solid
Works software. The model is then imported to Mastercam software for applying different
methods and parameters to simulate the tool. Then the suitable parameters having collision free
and reduced cycle time is taken into account. Then, the NC program is generated using the
required post processor and program is entered to the 5- axis CNC milling machine to perform
both roughing process and finishing process. Material used is Aluminum Alloy 6061. As per the
experimental results, it has been observed that constant overlap spiral tool path for top part
machining is selected and high speed tool path is selected for bottom part 3- axis rough
machining and rotary 4 axis tool path for final finishing ensuring collision free and reduced cycle
time. The cycle time resulted by Mastercam software is less than the cycle time resulted by the 5
axis CNC VMC milling machine. Then, the total machining time of camshaft as per the profile
were found to be 5.83 hours and 52 seconds.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
22
Risk Analysis in Construction Scheduling
Musale Kunal Rajendra, Aher M.C.
N.D.M.V.P.’S K.B.T.C.O.E., Nashik
Abstract: Large and complex construction projects always face an uncertainty that leads to risks
of delaying the project. Construction projects are of different sizes and of different nature and
risk associated with them also vary. Schedules are very essential to the successful execution of
projects. Without a schedule, it is difficult to coordinate the various activities found in a
construction project. Most schedules are developed in a deterministic manner using Critical Path
Method. Unfortunately, construction schedules are affected by various uncertainties. As a result,
schedule delays are common in various construction projects. Therefore, it is important to find
out probabilities of schedule delays. To evaluate the probability of construction time-overruns
and Forecasting of appx. Accurate project completion date is a challenge to construction
schedulers. Management of risks and uncertainties in construction projects is possible if risks
have been identified and the potential impacts have been analyzed. The Critical Path Method
(CPM), which is used to schedule construction activities, is deterministic with regard to the
duration assigned to the execution of the activities and the results produced in certain values.
Unfortunately, construction activities are performed under uncertain conditions. Project risks
cause variations in activity duration, and in turn the entire network is affected by uncertainty. To
evaluate construction networks by considering risk factors, nondeterministic scheduling methods
such as the program evaluation and review technique (PERT), the probabilistic network
evaluation technique (PNET), Critical Chain Scheduling (CCS), and Monte Carlo simulation
(MCS) have been developed. In the present work, an attempt is made to study the effect of
uncertainties in the project on the total duration of the project in an Indian context. For this,
Monte Carlo simulation (MCS) technique is used. Effect of different distributions for different
activities and the number of simulations on the total project duration are determined and
compared with the CPM and PERT. Finally, sensitivity analysis is carried out to show the
influence of each uncertain activity on the total project duration.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
23
Review of VANET Routing in Opportunistic Environment
Dhanveer Kaur, Harwant Singh Arri
Lovely Professional University, Phagwara
Abstract: Vehicular Ad hoc Network (VANET) is based on principles of Mobile Ad hoc
networks (MANET). It is a spontaneous process of data exchange from one node to another
node. Vehicular networks comes with new promising field in wireless technology which is used
to deploy a vehicle to vehicle communication (V2V) and vehicle to infrastructure (V2I)
communication between nodes. In VANET routing main drawback is packet dropping, but it will
be reduced by intelligent routing which can be optimized by met heuristics. In this thesis we
proposed VANET based routing which depend on shortest path and social information, optimize
by met heuristics.
Read Full Paper
Review of VANET Security on Trust Base
Diljot Kaur, Simarjit Singh Malhi
Lovely Professional University, Phagwara
Abstract: In Trust based Networks, nodes are typically being controlled by realistic entities such
as people. Trust based Network is aiming at enabling communication through highly
heterogeneous networks by relying on dynamic nature of message transmission whenever there
is arise in communication opportunities, such communication thus does not rely on a routing
infrastructure and is peer-to-peer in nature. The delay-tolerant paradigm is akin to trust based
networks, thus a suitable approach to address the lack of connectivity and the mobility. In this
thesis we simulate attack and are monitoring the nodes by Particle swarm optimization, thus
preventing the attack and which will lead to through put increase and overhead reduce.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
24
Characteristic Study and Enhancement of Mechanical Properties of Al2024 Gray
Cast Iron Powder Reinforced MMC by Heat Treatment
Manikanta M., S.S. Sharma, Sathish Rao U.
Manipal Institute of Technology, Manipal, Karnataka
Abstract: It is proposed to study the mechanical properties of Al2024-gray cast iron composite
with age hardening process and compared with as cast specimen. All heat treatment processes
are carried out in atmospheric conditions. Al2024 is a reasonable choice as a matrix material to
prepare MMCs owing to high strength (especially at elevated temperatures), toughness, and, in
specific cases weld ability. Among different types of the recently formed composite materials,
particle reinforced MMC and in particular aluminum as matrix material has found to have
industrial applications. Gray cast iron powder reinforced aluminum 2024 composites possess a
unique combination of high specific strength, high elastic modulus than the corresponding
unreinforced matrix alloy system. By double stir casting method, Al2024 will be reinforced with
gray cast iron powder. Heat treatment is given so as to tailor and improve the required
mechanical properties as per the requirement. Gray cast iron is selected since it is believed to
improve the hardness as well as the mach inability due to the presence of both iron carbide and
free graphite in gray cast iron powder. Here three different proportion of gray cast iron
composite are prepared by stir casting process. Age Hardening treatment is given to the samples
with different percentage of gray C.I, and different properties such as microstructure, hardness
and corrosion are compared with as cast Al2024- gray cast iron composite of respective
composition. The possible outcomes maybe increase in mechanical properties by addition of
gray cast iron.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
25
Design of Steam Piping System for Dryers in Paper Machine and Checking its
Sustainability through Finite Element Analysis using Caesar II
Mohammad Taseem Rafique Kadagaonkar, Milind S. Yadav
Finolex Academy of Management and Technology, Ratnagiri
Abstract: Process piping is a form of pipe work used to transport materials used in industrial
processes and manufacturing. It is specially designed for particular applications to ensure that it
will meet health and safety standards, in addition to suiting the needs of a given manufacturing
process. The designer of the piping also has to consider issues like the amount of pressure the
piping will be subjected to and the width of the piping, when selecting an appropriate
construction material for longer life of system. In this project study, by using data like P & ID, 2-
D and 3-D piping system is designed by following codes and standards. Finite element analysis
is performed with the application of various loading cases to check sustainability of piping
system in design service condition. The results of the study show that the primary and secondary
stresses are within code allowable limits. Hence system is safe for stresses. Also nodal
movements are shown in displacement summary report.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
26
A Comparative Study of Gender and Youth between Rural and Urban
S. Ananda
S. J. M. Arts, Commerce, Science College, Chitradurga, karnataka
Abstract:
Objective: The purpose of the study is comparison of Rural and Urban Gender discrimination
among the youths. Subjects and Method: For the purpose of study the subjects were one hundred,
twenty (120), sixty (30+30=60) rural boys and girls from Belagatta, Madakaripura Sasalahatty
villages of Chitradurga Taluk, sixty (30+30=60) urban boys and girls from Chitradurga town of
Karnataka State. Between the ages of 18 to 28 years were selected. The researcher had been
selected the following groups at the village level literate, illiterate, hereditary job holders,
traditionalists, caste, family, At the urban educated, migrants, unorganized workers, unemployed
youths. The data was analyzed by applying independent t-test. The level of significance was set
at 0.05.
Result: The results of this study show that the majority of the components are significantly
higher in rural joint family group. The results of the study also indicate that the significant
difference in exclusive on rural caste restricted to youths and migrants in urban. The urban
youths are better than the rural youths.
Conclusion: In significant difference found in endurance and flexibility between rural and urban
gender discrimination among the youths. And there were significant difference found in
inequality treatment to boys and girls in rural society, But in urban some better treatment to both.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
27
Structural and Vibrational Analysis of Wheel Rim
P. Dileepkumar, G. Ramesh, G. Suresh
V.E.M.U. Institute of Technology, A.P.
Abstract:
The purpose of the car wheel rim is to provide a firm base on which to fit the tyre. Its
dimensions, shape should be suitable to satisfactorily accommodate the particular tyre required
for the vehicle. In this a tyre of a car wheel rim belonging to the disc wheel category is
considered. Design is an important industrial activity which influences the quality of the product.
The wheel rim is designed by using modeling software CATIAv5R18.In modeling the time spent
in producing the complex 3-D models and the risk involved in design and manufacturing process
can be easily minimized. So the modeling of the wheel rim is made by using CATIA. Later this
CATIA model is imported to ANSYS for analysis work. ANSYS software is the latest software
used for simulating the different forces, pressure acting on the component and also for
calculating and viewing the results. A solver mode in ANSYS software calculates the stresses,
deflection, bending moments and their relations without manual interventions, reduces the time
compared with the method of mathematical calculations by a human. ANSYS static analysis
work is carried out by considering two different materials namely Aluminum Alloy and
Structural steel and their relative performances have been observed respectively. In addition to
this, rim is subjected to vibration analysis, a part of Dynamic Analysis is carried out and its
performance is observed.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
28
Implementation of Anonymous and Secure Communication System with Group
Signatures: A Review
Vaibhav P. Thakare, Chetan J. Shelke
P.R. Patil College of Engineering & Technology, Amravati
Abstract: For Privacy Preserving Communications Both Anonymity and end to end encryption
mechanism is essential. Identity Based Encryption technique is best suitable for secure and
anonymous communications. For solving anonymous and secure communication problems both
cryptographic and IBE based protocols needed which governs the proper communication
between two parties. For the purpose of authentication of the user proxy server is maintained
between user and service providers. The GM and KGC are essential in anonymous
communication for issuing both signing and decryption keys for getting plaintext from ciphertext
in original form. Public key encryption and digital signature mechanism needed for guarantees of
secure communication between both ends. Finally protocol realizes secure and anonymous
communication between sender and receiver.
Read Full Paper
Standardisation (Phytotoxicity) of Germination Media (Paper) for Mustard
Seedling Evaluation
Amol C. Vikhe
Ajeet Seeds Private Limited Chitegaon, Aurangabad
Abstract: The standardization (Phytotoxicity) of germination media (Paper) is an important and
essential aspect in seed industry (seed testing laboratory).The present work done on germination
paper, which tested in our laboratory and showed good as well as bad results of germination
papers. The germination papers accepted from consignee showed fluctuation in paper testing. We
tested all the parameters regarding paper testing and also for germination testing. The paper
sampled into 25 lots and tests were followed. Out of 25 lots seven lots failed to meet the standard
parameter. The eighteen sampled lots meet to standard; hence the present study Revealed that to
check the (Phytotoxicity) germination papers accepted from consignee before it use for
germination.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
29
Novel Technique of Clustering based Reac-In Routing with Probabilistic Approach
Amandeep Kaur, Harpreet Kaur
Bahra Group of Institutes, Patiala
Abstract: The study shows that, to save energy and improve bandwidth efficient cluster-based
topology, and scalability of the network, but difficult to balance the network after the running of
the period of time, the remaining energy of all nodes. In addition, with increasing WSN sensor
nodes, the path of the search space to increase exponentially therefore seek effective heuristic
algorithm to solve the clustering and routing in WSN is very important. Probabilistic approach in
Reac-In algorithm is a new kind of optimization algorithm, which draws on the principles of
Iterative change the cluster size and cluster head by optimization method.(1) broad access to
information at home and abroad, an overview of the wireless sensor networks and its
characteristics, summed up the WSN routing features and design requirements, analysis of
current major the strengths and weaknesses of the routing protocols, and pointed out that the
current research hotspots and unresolved problems. (2) We were studied on how to dynamically
determine the optimal number of clusters, to analyze the factors affecting the optimal number of
clusters. Simulations results show that Reac-In improve the optimal number of clusters compared
to the life cycle of the network to be extended. (3) considering the degree of energy balance
remaining node residual energy and network energy consumption is proposed based on the right
to non-linear decreasing Presented with energy inspired based the priority encoding PSO routing
algorithm to reduce the probability of an invalid path and improve the reliability of the network
routing to provide new ideas for WSN routing optimization.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
30
Project Success, It’s Performance Evaluation and Prediction for Transmission
Construction Project
Pankaj Purushottam Chandwadkar, Prof. R.V. Devalkar
K.B.T.C.O.E., Nashik
Abstract: Existing studies tend to agree that there are links among certain key aspects of any
project, their systematic enlisting and measurement and directional efforts to improve the
performance of project. These aspects are selective and specific and if tracked in a systematic
fashion along with necessary corrective action can not only measure any particular project’s
performance but also indicate to the higher management in the organization about the approach
to be changed in selective area so as to enhance the business success, in general and project’s
success in specific. This seminar tends to study various aspects, present a checklist and track
sheets along with comments to improve the transmission project’s performance. Transmission
being critical activity and among the important services so as to serve the society’s electricity
needs, are taken into consideration. A systematically addressed relationship among these criteria
and that how these criteria affect the project success is the gist of this seminar. A sincere attempt
is made for establishment of relationships of various factors affecting the project’s success and
utilizing that relationship for making alert and guiding during project monitoring of
Transmission Project. It is concluded that these aspects are not only important to improve project
performances on quality, time, cost, and safety, but also critical to appropriately deal with
transmission power projects’ externalities for achieving the objectives on project migration,
ecological, social and environmental impacts. These results can help Project managers to better
understand the relationship between the said aspects and project performance, and encourage
them to optimize and take corrective actions for better project outcomes. With support of a case
study of 400 KV substation (transmission) project‘s data collected and it has revealed strong
correlations between various aspects and project performances.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
31
Applying the Fuzzy Critical Path Method to Manufacturing Tugboat
K. Usha Madhuri, K. Chandan
Sanketika Institute of Technology and Management (S.I.T.A.M.), Visakhapatnam
Abstract: The critical path method is used to date in production operations whose outputs are
relatively large complex end items such as highways, buildings, and ships. This paper considers
Fuzzy Mathematical Model to find fuzzy critical path, fuzzy project duration in the network. All
the activities in the network are represented by trapezoidal fuzzy numbers. Linear programming
model is applied to find fuzzy critical path and fuzzy project duration in manufacturing Tugboat
(Tugboat is a small ship that exercises vessels by pushing or towing). Finally practical
applications shown with comparison.
Read Full Paper
Celebrities and Social Cause- Detailed Analysis of Importance of Choosing a
Celebrity Followed by Pulse Polio Advertisement
Radhika Wadhera
Pacific Academy of Higher Education and Research University, Udaipur
Abstract: The term Celebrity refers to an individual who is known to the public (actor, sports
figure, entertainer, etc.) for his or her achievements in areas other than that of the product class
endorsed (Friedman and Friedman, 1979).The objective of this research paper was to examine
the celebrity endorsements impact on society as a whole, its positive and negative effects on the
society. For achieving the objective of the study an empirical study was designed and for the
collection of data questionnaire was used. To analyse data descriptive statistic and ANOVA test
was used.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
32
Comparative Study of Successive Factors of Residential and Commercial Project In
Nashik
Pushkar S Kothawade, Mrs. Madhura Aher
N.D.M.V.P.’S K.B.T.C.O.E. Nashik
Abstract: The findings of this study suggest the importance of the attractiveness of project
location, level of contribution to business value, accuracy of cost estimation, level of
innovativeness, and effectiveness of cost control for a successful real estate project. The
applicability of the proposed model is tested on Nashik real estate projects and the results are
found to be satisfactory. Real estate companies may benefit from the findings of the proposed
model in assessing the performance of their projects and may take the necessary actions to
achieve better success in their projects.
Read Full Paper
Detailed Modelling of Permanent Magnet Synchronous Motor (PMSM) for
Electrical Forklifts part-IV Designing of Subsystem Model of PMSM Block
Aaditya Khare, Dr. Smita Shrivastava
Dr. K.N. Modi University, Newai, Rajasthan
Abstract: The research work deals with Detailed modelling of permanent magnet synchronous
motor for electrical drives. In this paper we have discussed about mathematical modelling of
PMSM for Electrical Forklifts designing aspects of subsystem model of PMSM Block of the
Main model. Permanent magnets to replace the electromagnetic pole with windings requiring a
less electric energy supply source resulted in compact dc machines. Likewise in synchronous
machines, the conventional electromagnetic field poles in the rotor are replaced by the PM poles
and by doing so the slip rings and brush assembly are dispensed. With the advent power
semiconductor devices the replacement of the mechanical commutator with an electronic
commutator in the form of an inverter was achieved. These two developments contributed to the
development of PMSMs and Brushless dc machines. Due to many applications of PMSM like
sensor less speed control, appropriate position control, Servo motor, etc. Mathematical modelling
of permanent Magnet synchronous motor is carried out and simulated using MATLAB. The most
important features of PMSM is its high efficiency given with the ratio of input
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
33
Brain Controlled Prosthetic Leg
Manu R., Mithu Markose, Tonio P. Thomas
Federal Institute of Science and Technology, Kerala
Abstract: The brain-controlled prosthetic leg involves the technique of using the brain waves to
control the motion of a prosthetic leg. The brain waves are obtained using a device called
Mindwave. This device captures the complex brainwaves through the analysis of
electroencephalogram power spectrum. The brain signals are then further processed using an
Arduino microcontroller which then drives the motors to control the motion of the prosthetic leg.
Through this approach, the natural motion of human leg can be regained using prosthetics at a
very low cost.
Read Full Paper
Impact of HR Practices on Employees Job Satisfaction
Deepesh Kumar Yadav, Dr. Jaya Yadav
Amity University, Noida
Abstract: The aim of this paper is to bring out the impact of HR practices on employees job
satisfaction. There are certain activities which are imperative for job satisfaction of employees
policies like working environment, co-operation between departments, team work, retention,
promotion policies, grievance handling etc. These all together gives the job satisfaction to the
employees. If the employees are happy the productivity rate will definitely be high in other terms
productivity will touch the sky and if the job satisfaction is not there then the organisation will
definitely suffer. It is both management and employee’s responsibilities, and in their interest, to
ensure that employees work in a positive atmosphere because relationship with the management
can either maximize or minimize productivity and cause or prevent stress and fatigue.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
34
Optimization, Analysis and Comparison of 4 and 16 bit Carry look Ahead Adders
using 0.3μm Process Technology for SCMOS
Ruchi Rai, Prof. L.N Gahalod, Dr. Rita Jain
L.N.C.T., Bhopal
Abstract: - A method illustrated in this is to design carry look ahead adders using SCMOS
technology, also analyzed the effect of various parameters on the characteristics of adders, using
50 nm, spice model for CMOS technology. The design was implemented for 16 bit and then
extended for 32 bit also. Here parameters are computed and response curves are computed
between all characteristics, DC and transient characteristics. The design and simulations are
carried out to achieve these values approximately. Design will be carried out in Electric CAD
and Xilinx. Simulation results are verified using Modelsim and LTSpice. The DRC, LVS/NCC,
transient checks are performed in the proposed design. Noise analysis is also done. In
comparison with the existing full adder designs, the present implementation will offer significant
improvement in terms of frequency.
Read Full Paper
Review on: Heterogeneous Leach in 3-Dimensional Wireless Sensor Network using
Gateway
Vandana Jain, Amanpreet Singh Dhanoa
Rayat Bahra University
Abstract: Wireless Sensor Networks are those networks in which communication is carried out
through a wireless channel. A sensor network is a group of specialized transducers intended to
monitor and record conditions at diverse locations. These parameters are temperature, humidity,
pressure, speed, intensity, vibration-sound intensity, PIV etc. Numbers of towers in area act as
sensors are called as nodes in wireless sensor networks. Thus from one node to other,
communication is carried out without any physical link. A network consists of numbers of nodes
with one as a source and one as a destination. This paper proposed A-LEACH protocol and
cluster member elect cluster head to avoid excessive energy consumption. Cluster Head is
responsible for creating and manipulating a TDMA schedule & sending aggregated data from
nodes to the BS where this data is needed using CDMA. Gateway is a network point that reduces
the distance between CH and BS in WSNs. In this paper proposed a multiple hops data
transmission and make energy efficient and energy conservative protocol design to increase data
rate.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
35
Digital Photo Sensor Able to Differentiate up to Three Light Intensity Bands and its
Applications
Akash Verma, Hikmat Beig, Vijay Kumar Yadav, Vivek Singh
I.E.T., Lucknow
Abstract: This paper deals with the design of a module which can differentiate among three
different light intensity ranges. This module uses two LDRs in such a configuration, so that they
can collectively give the output which helps in differentiating among various light intensity
ranges. The unique feature of the module is to differentiate among three different light intensity
ranges which finds applications in the area like automatic plant irrigation system, automatic
street light system, maintaining light at a particular intensity and further more.
Read Full Paper
Comparative Study of Manure Produced from Wastes
Gaurav Singh, Akhil Kumar Gupta, Divyank Tiwari, Matulya Mani
I.E.T., Lucknow
Abstract: The blind use of fertilisers have made the soil dilapidated to such an extent that it
would take 3 years of no cultivation and continuous fixing of minerals by organic methods, to
convert the soil for the purpose of organic farming. Chemical fertilisers are like a drug to the
soil, the more we use the more will be required. In order to bring a change and to make organic
method more demanding and handy, a set of trials were done. The experiments were conducted
inside the college campus using different type of manures, farm yard manure (made by cow dung
straw and cow urine), garden manure (made by dry shredded leaves, kitchen waste and thrown
flowers) and vermicompost (using Eisenia fetida earthworms) made by easy composting in
normal pressure and temperature and were tested on mangifera indica (mango) plants.
Significant effects were observed on the plant yield. The use of lactobacillus serum alone has
increased the yield significantly. Field studies evaluated the use of leachate along with the green
manure. The study was done on the optimum use of manure for the nutrition requirement of
plant.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
36
Innovation of Mobile, Mobile Commerce and Mobile Apps as Disrupted the
Businesses of Small Units
R. Parvathi, Dr. Veena Angadi, Gattamraju Sreelatha, Dr Gopala Krishana
R.E.V.A. University
Abstract: Mobile, Internet and Mobile Application has created a new market and new world of
network which has eventually disrupts an existing traditional business market and given
importance to internet through Mobile Apps to online Business. The electronic gadget, computer
which was nothing better than a big calculator has taken over the entire business market and
captured as electronic market through e-Commerce, eventually established itself to M-
Commerce, Business on the Mobile gadget where consumer carry any time, any place and do
business at any point of time. This created a huge platform to new market and ultimately
eliminated the existing business. Purpose of the study says that Flipchart, Amazon, e-bay,
BigBasket, these business houses are attracting the customer through online. Customer can shop
from home at much cheaper rates could save even up to 80% discount rates with all kind of
guarantee and warrantee with best quality and replacement assurance. An objective of research
work is to “To assess the impact of mobile, Mobile Commerce and Mobile apps on business
practices.”. The article expected to through the light on the disruptive innovation of Mobile,
Mobile Commerce and Mobile Apps.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
37
Response of Jhelum Rice Variety to Different Crop Management Practices towards
Morphological and Yield Parameters in Temperate Kashmir Valley
Javaid Ahmad Wani, Dr. Amit Sharma
Dr. C.V. Raman University, Bilaspur
Abstract: Field experiment were conducted to compare the System of Rice Intensification (SRI)
Practices with the Conventional management Practices (CMPs) or farmers’ practices of rice
(Oryza sativa L.) in context of Morphological and yield production parameters at district Kulgam
of J& K(2016). The investigational variables included combinations of seedling number and age
(10 day-old single vs. 21 day-old), spacing (25 x 25 cm vs. 20 x 10 cm), irrigation (intermittent
irrigation vs. continuous flooding), and weed control (cono-weeding vs. manual weeding)
however for both sets of methods, the organic manure (mixture with cow dung and straw) was
applied along with chemical fertilizers at the same rate. The test was laid out in randomized
factorial design. Highest grain yield (637.9 gm–2) were obtained from SRI practices (planting 10
days-old seedlings hill–1 at 25 x 25 cm spacing + intermittent irrigation and cono-weeding).
Yield under CMP (planting 21 day-old single seedlings at 20 x 10 cm + continuous flooding and
manual-weeding: 448.9gm-2) was lower than that of SRI practices. Thus the overall results
indicated that all the cultivars under study performed better under SRI as compared to other
traditional practices with respect to different morphological and yield traits including grain yield.
All the cultivars exhibited increased leaf area, leaf area index and Crop Growth Rate (CGR)
under SRI practice as compared to CMP cultivation practice.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
38
Synthesis and Characterization of O-Alkyl ,O-Aryl and O-Cycloalkyl
Trithiophosphato Derivatives of Lanthanum (III) Chloride and their Adduct with
Nitrogen Donar Bases
Rafia Ahmad, U.N. Tripath
M.L.K.P.G. College, Balrampur
Abstract: Chloro lanthanu (III) trithiophosphates (RO)(S)(P)(S)2LaCl where R = Me,Et, nPr, iPr,
nBu, sBu, iBu, iAm, cyclohexyl, Phenyl, were prepared in the methanolic solution of LaCl3 and
dipotassium salt of trithiophosphates. Addition complexes of the type (RO)(S)(P)(S)2LaCl
.nL(where n=1,L=(C6H4N)2 1-10-phenanthroline and (C5H4N)2 2,2 -bipyridyl were prepared
by reaction of chloro Lanthanum (III) trithiophosphate and nitrogen donar bases in dry methanol.
These newly synthesized derivatives have been characterized by elemental analysis, moleculer
weight measurement, I R, 13C, 31P spectral studies. Coordination no of three and five are
suggested for La (III) in these derivatives. Key Words : La(III) ; 1-10-phenanthroline ; 2,2 -
bipyridyl Corrosponding Author; [email protected]
Read Full Paper
Gas Sensor Array for Quantitative Detection of Gas Mixture
Pauroosh Kaushal, Nirlipta R. Mohanty
D.Y. Patil College of Engineering, Akurdi
Abstract: Two semiconductor gas sensors which are sensitive to methanol and acetone were
chosen to form a gas sensor array. Response of sensor array combined with pattern recognition
technique of artificial neural network was used to carry out the quantitative analysis of gas
concentration in a mixture. Separate gas is injected on gas sensor to understand the sensitivity of
sensor upon change in gas concentration. Gas mixture of different acetone and methanol gas
composition is prepared and response on sensor array is acquired. The acquired data is a function
of concentration profile of gas mixture. Data is pre-processed and given to neural network for
quantitative analysis of gas concentration of the mixture. The results show that the system can
analyze the gas mixture and produce quantitative data with good accuracy.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
39
A Study on Investors’ Expectations on Mutual Funds Offered by Share Khan with
Reference to Amravati City, Maharashtra
Prajakta Yawalkar
Maharashtra Institute of Technology, Pune
Abstract: Mutual Funds is an investment funded by shareholders that trades diversified holdings
and is professionally managed by companies. In this paper researcher is focused to understand
the investors’ expectations on mutual funds
Read Full Paper
Medical Image Watermarking with Patient Details as Watermark
Sumit Kumar Srivastava, Harikesh Pandey
Dr. A.P.J. Abdul Kalam Technical University, Lucknow, U.P.
Abstract: The Digital watermarking has been introduced for increasing the medical image
security, confidentiality and integrity. The Medical image watermarking is a special sub-division
of the image watermarking in the aspects that the images have some special requirements. The
Medical image watermarking is an appropriate technique applied for increasing security and
authentication of the medical data or information, which is very crucial and used for further
diagnosis and future reference. This paper discusses the available medical image watermarking
techniques for protecting and authenticating the medical data. The paper focuses on about the
perceptual designing of the watermark for the digital images. The watermark designed
perceptually is then embedded to the digital images in wavelet domain. A perceptual model is
applied on to perceptually shape the watermark. This paper represents a primary study on the
degradation of medical images when embedded with various watermarks, using a variety of the
popular systems. The Image quality is measured with a number of widely used matrices, which
have been used elsewhere in the image processing. The watermark before embedding can be
compressed. This will lead to more secured and safely system. Also, it will take more effort to
break the system. Consequently, the medical image watermarking remains an open field for the
research and it appears that a selection of various watermarks for different medical image types
is the most suitable solution to the generic problem.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
40
Analysing of the Media and Public Tendencies in Twitter
Mr. Ashish Laxman Gaikwad, Mr. Sumit Suresh Shendkar, Mr. Mahesh Tukaram Atpadkar
Savitribai Phule, Pune University
Abstract: Social networking services such as Twitter creates content reflecting a series of talks
that appear in the real world Events. Twitter is a social networking site that provides service to a
large number of users to communicate with each other at same time. That is asymmetrical
relationship between friends and followers that provide dramatic structure of interest between
Twitter users. A series of Twitter messages called tweets, which are limited to 140 characters,
and thus are usually much focused. The basic process is the capture of Twitter tweets that extract
most discussed topic in between users. Tweet this Dataset can be processed using standard
natural language processing to search for trending stories. Common stories and erosion areso
brick is extracting and summarizing information gathered from social networking services. There
is the fact of Ways to find common stories that improve the quality of the result. This article
proposes an application to detect themes of tendencies of the data that the BNgram Twitter
disclosure rules use.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
41
Design of Gating System for Connecting Hinge by Traditional and Software Method
Ranjeet Mithari, Mahesh Shinge, Pravin Rajigare
Bharati Vidyapeeth’s College of Engineering, Kolhapur
Abstract: There is various metal casting parameters which are now know through various
experiment which are quantified. These parameters should be controlled to improve quality of
casted products. Metal casting involves design, gating and rise ring system design, mold design,
pouring of molten metal each process has its own effects on quality of the casting. The flow of
molten metal in mold accounts for almost 60% of the casting defects and due to this fact it is
quite obvious that it is important to pay more and adequate attention on preparation of molds in
such a way that molten metal will flow easily and fill the mould cavity properly. The molten
metal is elastically deformable during short interval of time when deformation causes stresses
remain in the molten metal and hence in the cast parts. After solidification these internal stresses
remain in the metal. The change in temperature is the common cause of volumetric changes in
the molten metal. The paper will focus more on study of gating system design since flow of the
molten metal has significant effect due to this system. Design of this gating system reduces
number of defects produced in casting. This system results compare in between traditional and
software. On the commercial front if we look at prices trend charts of important foundry raw
material we observe that there is consistent rise in prices and it is quite obvious that these will go
on increasing since we have no control over market circumstances and forces. In this situation
only alternative to remain competent and all foundries people to keep max control over all
manufacturing processes and hence related parameters so as to ensure the quality in the process
itself.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
42
Coping Strategies of Young Married Women in Banking Sector with Reference to
Health and Family
Ms Mugdha Sehgal, Pallavi Ahuja, Dr. J.K. Batra
Jagannath International Management School, Kalkaji, Affiliated to G.G.S.I.P.U.
Abstract: Many researchers have been done on family work and health but only some of them
suggested the strategies to be used by women to tackle these issues. Our paper provides an
insight into the problems faced by the Indian married women working in private sector banks
and the ways which can help them in solving these issues. This study examines the kinds of
work, family and health conflict experienced by female married professionals working in private
banks and the suggested strategies & solutions to cope up with the dichotomy. Balancing work
and family tasks can put excessive stress on women, who in many families still take primary
responsibility for childcare and elder care and end up suffering several health issues. How do
such women bring a work-life balance? How do they cope up with the health issues they
confront due to work pressure? Will the workplace of the future evolve for the better so that
women won't have to worry anymore? Our paper aims at recommending the practices to deal
with such complications. Work-life and health balance is a complete myth. But by making
calculated choice about which prospect to pursue and which to turn down, rather than simply
reacting to crisis, women can engage with work, family, and health. The study is conducted with
100 women professionals working in private sector banks of Delhi region categorized as newly
married women and those with young kids across different levels in the hierarchical chain using
random sampling method. Percentage, averages and Likert scale will be used for data analysis.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
43
A Study on Adoption of M-Banking Services by Private Bank Customers in New
Delhi
Ms. Jasleen Rana
Jagannath International Management School, Kalkaji
Abstract: Internet is said to be the third most impactful revolution in the world after the
agricultural and industrial revolution. The evolvement of internet had led to the dot-com burst
which eventually transformed the traditional banking systems to systems like Automatic teller
Machine(ATM), tele-banking, electronic fund transfer and m-banking. Technology plays a very
essential role in delivering quality banking services and like any other technological innovation
e-banking has also been adopted rapidly by various banks and customers. The boom of e-
banking and smart phones has caused a huge shift from traditional banking habits to mobile app
banking. This study explains how people living in New Delhi have adopted the mobile banking
services provided by the private banks and it examines the factors which persuade the customers
to use mobile app for banking. This study is helpful for both private as well as public banks as it
gives an insight to what are the latest trends in m-banking and how people respond to it. How do
people take mobile apps as a mode of banking service? Are customers more concerned about the
ease-of-use or the risk attached with m-banking? Does difference in age group influence the
customer’s m-banking behavior? The study is conducted with 200 private bank customers in
New Delhi further categorized as customers already using mobile banking, customers using
mobile apps for banking and customers currently not using mobile banking with age groups,
using random sampling technique. The customers were surveyed with help of a structured
questionnaire. Percentage method, averages, standard deviation, regression and correlation
techniques have been used for data analysis.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
44
Intelligent Real Time Data Scan Module for Improved System Performance of
Distributed Flight Test Instrumentation System Architecture
Madhusudana Rao Vanamala, Vijay V. Patel, Prasad N.N.S.S.R.K.
Aeronautical Development Agency
Abstract: Configuring and designing on-board flight test instrumentation for a modern fighter
aircraft is a real challenge. Flight Test Instrumentation (FTI) System has to acquire data from
large number of sensors on aircraft. It demands distributed acquisition and centralized processing
based flight test instrumentation as the sensors and data acquisition units are spread across large
area of the aircraft. Acquisition of data in real time from large numbers of sensors, formatting
minor frames as per telemetry standards, and real time data telemetry is a critical task as load on
process is very high. This paper brings out a technique for relieving great extent processor load
from processor participating to exchange the minor frame data and on-board storage data
between remote acquisition unit (RAU) and data center (DACENT) with the help of Intelligent
Real Time Data Scan Module (IRDSM). This paper also brings out the detail design approach
adopted for IRDSM and significant performance improvement gained. Common design
methodology adopted for DACENT and RAU are also brought out here. Self test capabilities of
the module, component count reduction for better reliability, design of registry structure, process
of screening at the module level for better reliability, extensive testing of modules with different
configurations, etc, are also discussed. Issues encountered during the development phase are
brought in this paper.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
45
Hybrid Image Compression using DCT and Fuzzy Logic
Upendra Kumar Srivastav, Harikesh Pandey
Dr. A.P.J. Abdul Kalam Technical University, Lucknow, U.P.
Abstract: Today there has been big advancement in digital technology that has led to the
development of various easily usable devices and methods specially in the fields of
communications and data transfer to a longer distances. The transmission of data in the form of
documents, images, voice etc.is now reachable to all parts of the society and the services are
affordable to a larger number of people. An important aspect is data compression and for that
matter Image compression, as images form a larger part of data being exchanged over the
internet through social networking and messaging sites and apps all over the world. Among all
the various kinds of data images and videos constitute the bulkiest data. Thus, need for
compressing the image and video files is an important aspect in data communication. In this
research work we present a technique for image compression, using Discrete Cosine Transform
and Fuzzy Logic Techniques. The algorithm used in this paper is tested along with several
images and the results are compared with other techniques. Our method shows an improved
performance both in compression ratio as well as image perceptibility.
Read Full Paper
Self- Confidence among Dyscalculic Elementary School Students of Shimla District
Jeewan Jyoti
Department of Education H.P.U., Shimla
Abstract: The main objective of the present study is to compare the dyscalculic elementary
school students on self- confidence in relation to their gender and locality. Null hypothesis were
framed in regard to the objective. Investigator administered Self-Confidence Inventory,
developed by Dr. Rekha Gupta (2013), to the sample of 60 dyscalculic school students of 8th
class drawn from randomly selected schools of Shimla district. For the comparison of students
on self-confidence 2x2 ANOVA was used. No significant differences existed among rural and
urban dyscalculic elementary school boys and girls on self-confidence. .
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
46
An Enhanced Image Descriptor Algorithm for Image Retrieval using SIFT – PCA
Dr. R. Malini
Abstract: Due to the growth of internet and social media sites there has been a proliferation of
images which makes image retrieval a challenging job. The proposed an Enhanced Image
Descriptor Algorithm for Image Retrieval using SIFT-PCA involves three steps: feature
detection (Harris Detector), feature description (SIFT), dimension reduction (PCA). The features
of all images in database are retrieved and stored in feature database in the form of histogram.
When a query image is given, the generated histogram of query image is matched with feature
database of all image histograms and those images with minimum distance are retrieved.
Euclidean distance is used as the distance measure. For analyzing the performance of the
algorithm, average precision and recall are used. Precision is the measure of ability of a system
to present all the relevant items and Recall is defined as the ability to present only relevant items.
Read Full Paper
A Study on Customer Attitude Towards Online Shopping in India and its Impact:
With Special Reference to Solapur City
Prof. Pritam P Kothari, Prof. Shivganga S. Maindargi
Bharati Vidyapeeth University,Pune, AKIMSS Solapur
Abstract: The growing no. of internet user in India provides a bright prospect for online
shopping. If E-marketers know the key factors affecting behavior of customers and its
relationship then they can formulate their marketing strategies to convert potential customers into
loyal ones and retaining existing online customers. This researcher paper highlights on
factors which online Indian customers keep in mind while shopping. After completion of study
Researchers found that cognition, sensed usefulness, comfort of use; sensed enjoyment and
security are the five components which affect consumer perceptions about
online purchasing. Internet has changed the way consumers purchase goods and services at the
same time many companies have started using the Internet with the objective of cutting
marketing costs, thereby reducing the price of their product and service in order to stay ahead
in highly competitive markets. Companies also use the Internet to convey, communicate and
disseminate information to sell the product, to take feedback and also to conduct satisfaction
surveys with customers. Customers use the Internet not only to purchase the product online, but
also to compare prices, product features and after sale service facilities they will receive if the
purchase the product from a particular store. Many experts are optimistic about theprospect of
online business.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
47
k-Means Clustering based Lexicon Analytical Model for Multi-Source News
Classification
Kamaldeep kaur, Maninder Kaur
Doaba Institute of Engineering & Technology, Kharar
Abstract: The supervised models have been found more efficient for the purpose of news
classification. The major goal of the news classification research is to improve the accuracy
while decreasing the elapsed time. It is always difficult for the people to read all of the news on
their favourites portal which have listed over the given portal. In this research, an approach is
KNN lexicon technique which is used to obtain the popular news list from thousands or hundreds
of online news available through APIs. This approach uses extraction summarization for
summarizing the keywords thereby selecting the original sentences and putting it together into a
new shorter text explaining the overall overview of the news data. Then the lexicon analysis
would be performed over the given text data and then final classification of the news is done
using k-nearest neighbor. The results would be obtained in the form of the parameters of
accuracy, elapsed time, etc.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
48
Hall Current Effects on Unsteady MHD Convective Flow of Heat
Generating/Absorbing Fluid through Porous Medium in a Rotating Parallel Plate
Channel
Dr. P. Sulochana
Intell Engineering College, Ananatapuramu, Andhra Pradesh
Abstract: In this paper, we discussed the heat and mass transfer on the unsteady hydromagnetic
convective flow of an incompressible viscous electrically conducting heat generating/absorbing
fluid through porous medium in a rotating parallel plate channel under the influence of uniform
transfer magnetic field normal to the channel taking Hall current effects into account. The
momentum equation for the flow is governed by the Brinkman’s model. The analytical solutions
for the velocity, temperature and concentration distributions are obtained by making use of
regular perturbation technique. The variations of said quantities with different flow parameters
are computed by using Mathematica Software and discussed with the help of plots. The skin
friction, Nusselt number, and Sherwood number are also evaluated analytically and
computationally discussed with reference to pertinent parameters in detail.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
49
Growth in Agricultural Resource USE: An Application of Exponential Growth
Curve.
Prince Singh, Dr Manjeet Jakha
N.I.I.L.M. University, Kaithal, Haryana
Abstract: Agriculture is the means of livelihood for around two thirds of the work force of India.
Agriculture is the production, processing, marketing and use of foods, fibers and bye prducts
from plant crops and animals. It was the key development that led to the rise of human
civilization with the husbandry of domesticated animals plants creating food surpluses that
enabled the development of more densely populated and stratified societies. At the time of
independence, the revenue from the agriculture sector was quite low compared to what it is
today. The main reason for the increase in the revenue is the increase in agricultural production
that was brought about by the Green revolution, over the years, agriculture has emerged as one of
the top priorities of the Central & state governments. In 2000, the government announced the
first over “National Agriculture Policy”. The resources taken were consumption of fertilizers,
consumption of electricity in agricultural sector, short term and long term credit, number of
tractors, area under high yielding varieties, net irrigated and gross irrigated area and total
cropped area. It was computed using the exponential trend equation i.e.: Y = abt Log Y = log a +
t log b taking ^ b = (1+r) r = (b-1) x 100 Where Y = study variable; area, production, yield or
Resource variables a = constant ^ b = regression coefficient t = time, t = 1 ……………n r =
compound growth rate in percent To test the significance of the compound growth rates, t-test
applied was t* = r/S.E( r) Where t* = calculated t-ratio, distributed with (n-2) degrees of freedom
r = compound growth rate S.E. (r) = standard error of the compound growth rate, S.E. was
calculated by fitting the following formula. 100 x b S.E. (r) = Σ (log y)2 (Σ log y)2 (log b )2 Σ ( t
– t )2 Log 10e n (n-2) Σ (t – t )2 where the limit for Σ is, i = 1,2……n.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
50
Data Mining : Text Classification System for Classifying Abstracts of Research
Papers
Shirdi Wazeed Baba, Reddi Sanjeev Kumar
Indian Institute of Information Technology, Design and Manufacturing, Jabalpur, (M.P.)
Abstract: Text classification is the process of classifying documents into predefined categories
based on their content. Text classification is the primary requirement of text retrieval systems,
which retrieve texts in response to a user query, and text understanding systems, which transform
text in some way such as producing summaries, answering questions or extracting data. We have
proposed a Text Classification system for classifying abstract of different research papers. In this
System we have extracted keywords using Porter Stemmer and Tokenizer. The word set is
formed from the derived keywords using Association Rule and Apriori algorithm. The
Probability of the word set is calculated using naive bayes classifier and then the new abstract
inserted by the user is classified as belonging to one of the various classes. The accuracy of the
system is found satisfactory. It requires less training data as compared to other classification
system.
Read Full Paper
Multivariate Indoor Scene Recognition using the Object Level Analysis with SVM
Classification
Neetu Dhingra
Patiala Institute of Engineering and Technology, Punjab
Abstract: The research area of the indoor scene recognition has attracted the various scientists
and engineers across the globe, which includes the neuroscientists, electronics engineers, robotic
engineers, digital image experts, camera developers and manufacturers for the purpose of
application designing in the fields of the computer vision, vision based communications and the
access control systems. The indoor scene recognition methods require the inclusion of the
various methods in the computer vision, image processing and feature recognition for the scene
recognition by identifying the category of the input image by comparing it against the given
training databases by the means of the feature descriptor (popularly based upon the color or low
level features) and the classification algorithm. The indoor scene classification algorithms
require the number of the computations and feature transformations along with the normalization
and automatic categorization. In this thesis, the multi-category dataset has been incorporated
with the robust feature descriptor using the scale invariant feature transform (SIFT) along with
the multi-category enabled support vector machine (m SVM).
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
51
Microwave Welding using Stainless Steel Grades – A Short Survey
Valsaraj T.S., Mr. Sathish Kumar
S.N.S. College of Engineering, Coimbatore
Abstract: This paper deals with Microwave welding using stainless steel grades. The field of
microwave joining had taken a great leap in the past decade, Due to its special and exceptional
characteristics like selective heating, volumetric heating and inverted heating profile it’s has
been introduce in the field of the microwave joining of materials ,previously which was limited
only to the processing of food. It also has an edge over conventional methods due to these
characteristics. Microwave energy is generally new area of topic in material welding or material
joining even though it has been introduced already in many industries like medical, food
processing, drying. This process with the help of microwave radiations deals with joining of
similar and dissimilar materials. These joints were characterized using various techniques.
Read Full Paper
On the Principle of Exchange of Stabilities in the Magnetohydro Dynamic Benard
Problem with Variable Gravity by Positive Operator Method.
Pushap Lata Sharma
Rajiv Gandhi Govt. Degree College, Chaura Maidan Shimla-4 (H.P.)
Abstract: In the present paper, the problem of Benard for the magneto hydrodynamic field
heated from below with variable gravity is analyzed and it is established by the method of
positive operator of Weinberger and by using the properties of Green’s function that principle of
exchange of stabilities is valid for this general problem, when g (z) is non-negative throughout
the fluid layer.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
52
Development of Multi Objective Techniques-A Case Study of Punjab and Haryana
Prince Singh, Dr Manjeet Jakha
NIILM University, Kaithal, Haryana
Abstract: In India and abroad, the commonly used decision modelling in real life rests on the
assumption that the decision maker seeks to optimize a well-defined single objective using
traditional mathematics programming approach. A farmer may be interested in maximizing his
cash income, with certain emphasis on risk minimization. On the other at county level especially
in a developing country a planner may aspire for a plan while maximizes food grains production
and also to some extent considers employment maximization etc as the goals. Keeping in view
the objectives of the study, state-wise secondary data on different variables for the period 1980-
81 to 2014-15 were collected from Statistical Abstracts of Punjab, Fertilizer Statistics,
Agricultural Statistics at a glance and the reports of the Commission for Agricultural Costs and
Prices, published by Ministry of Agriculture By taking its deviations of observed Yt from its
estimated value we got the error or the risk coefficients for each year for each crop. These risk
coefficients were taken in the matrix formulation in the MOTAD format suggested by Hazell
(1971 a and b). To give a meaningful explanation to the level of risk, total mean absolute
deviations in gross returns were derived as under: Min A = 1/S Σ│ (chj-gj) xj│ Where A is the
minimum average absolute deviation defined as the mean over (h=1………s) years, of the sum
of the deviations of gross returns (chj) from the trend in gross returns (gj) multiplied by activity
levels x j (j = 1………n). Where A is an unbiased estimator of the population mean absolute
income deviation Where A = estimated mean absolute deviation S = no. of years chj = gross
returns of the jth activity in hth year gj = sample mean of gross returns of jth activity x j =
activity level This was minimized subject to the following constraints: Σaij xj ≤ bi (for all i =
1………….m, j =1……..n) Total activity requirements for the i th constraint, the sum of the unit
activity requirements aij for the constraint i times the activity levels ‘xj‘do not exceed the level
of the i th constraint bi for all ‘i’ and x j 0 all activity levels are non-negatives. Where an ij = per
unit technical requirement for the jth activity of the ith resource. bi = the ith resource constraint
level m = no. of constraints n = no. of activities
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
53
A Review of the Research on Aviation Risk Identification
Kaustav Jyoti Borah, Mohan Kantipudi
Gauhati University, Assam
Abstract: Flying involves risk. To stay safe, you need to know how to judge the level of risk,
how to minimize it, and when to accept it. Before the risk to happen we need to identify the
hazard. Hazard is anything with the potential to cause harm it’s a present condition, event, and
object, circumstance that could lead or contribute to a death to people, loss of property or
equipment. It is a source of danger. Flying is one of the most secure methods for travel yet things
turn out badly because of different reasons, for example, Human-errors, mechanical, climate,
criminal activities. Records from the past mischance’s has brought about the development of
flight frameworks and innovation has lessened danger of past mischance’s yet has made flight
taking care of more entangled through years.
Read Full Paper
Implementation of Just-in-time in an Enterprise
Kiran Mahendrabhai Patel, Karan M. Patel, Rohan S. Sanap
G.E.S’s R.H.S.C.O.E., Nashik
Abstract: Rapid industrialization has increased competition in the market and it has become
troublesome for the industries (especially for small scale industries) to persist with this kind of
modern industrialization. In order to survive in the market an enterprise should produce a good
quality product which can be affordable to common man within a specific span of time.
Management of time is of an immense importance for any enterprise or industry as it can
accomplish more with minimum efforts. To overcome numerous problems Just-in-Time can be
introduced to an enterprise. Just-In-Time deals with the production of any item after the order
from consumer and not to produce items before the need or in advance.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
54
On the Class of (K-N) Quasi-n-Normal Operators on Hilbert Space
Sivakumar N., Bavithra V.
Hindusthan College of Arts and Science, Tamil Nadu
Abstract: In this work we introduce another class of normal operator which is (K-N) quasi n
normal operator and given some basic properties. The relation between this operators with
another types of normal operators are discussed. Here the results are given by using the
conditions of (K-N) quasi normal operators.
Read Full Paper
On Parahyponormal and Quasi Parahyponormal Operators
Sivakumar N., Dhivya G.
Hindusthan College of Arts and Science, Tamil Nadu
Abstract: In this paper we discuss about a new class of operators on Hilbert space. We call these
operators as parahyponormal operators. Moreover, here we discussed some results on quasi
parahyponormal and M-Quasi parahyponormal operators.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
55
A Study about the Microfinance Models and Role of Financial Institution in
Empowering Rural Finance: – An overview.
Ahsan Ul Haq, Dr. Javed Iqbal
B.G.S.B.U., Rajouri
Abstract: Abstract The purpose of this paper is to examine the role of financial institution and to
study the different microfinance models which are empowering rural finance development in
India. In this paper an attempt is made to find out how financial institutions are empowering the
rural people and study the different microfinance models as well as different clients of the
microfinance. India which is the one of the largest microfinance center in the world nowadays. In
India more than 25% of its population lives below poverty line. For this poverty alleviation the
Govt. of India started various programs from time and again but failed in achieving this goal.
The reasons behind the failure are such as the Govt. of India fail to reach the target population,
the loophole in the system, corruption etc. The different countries of the world come with
different ideas and schemes and these schemes increased the NPAs .Then the microfinance
institution come forward to fulfill these gaps but the outreach is small as compared to the
requirement and potential but some progress had been seen in this regard when NABARD and
SHGs played an active role in this. After than numbers of different microfinance institution and
different NGOs also dived in this business. Govt. must power the microfinance institution for
mobilizing savings, with increase demand for the rural finance .How ever keeping in mind the
recent experiences, and for the better growth we need to managed these microfinance institution
in a better way and provide them adequate finance which full fill the needs of poor and also
provide them a social responsibility which is most important for the growth of these
microfinance institution and for alleviating poverty from the country. There is no doubt that
NGOs played an important role in promoting SHGs so there should be need to start some
incentive packages for these NGOs which motivates them to diversify themselves and their
business to backward areas also.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
56
Response of Bacterial Isolates to Various Antibiotics Isolated from Petroleum
Spilled Soil.
Ritu Sharma
M.D.S. University, Ajmer,Rajasthan
Abstract: All the bacterial isolates were studied for their responses to various antibiotics. Out of
28 bacterial forms, 12 forms were resistant to ampicillin, 10 forms to penicillin, 3 forms to
erythromycin, 5 forms to streptomycin and only one isolate was resistant to tetracycline.
Indicating that tetracycline was the most effective antibiotic for these bacteria.
Read Full Paper
Bioremediation of Petroleum Products through Bacterial Isolates.
Ritu Sharma
M.D.S. University, Ajmer
Abstract: Bioremediation is the use of biological treatment to destroy or reduce the concentration
of hazardous wastes from a contaminated sites. such system involves the uses of biological
organisms such as bacteria fungi and plants, to reduce or eliminate toxic pollutants from
contaminated sites by degradation assimilation or transpiration in the atmosphere is called
bioremediation degradation is the mode of elimination mostly in case of organic compounds
while heavy metals are assimilated. These microbes and higher plants can also be variously
modified by genetic engineering to become efficient and suitable for bioremediation.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
57
Offloading in Mobile Cloud Computing by Exception Maximization Algorithm
Samriti Goyal, Bhartii Grover
Gurukul Vidyapeeth Institute of Engineering and Technology, Punjab
Abstract: Offloading in mobile cloud computing by exception maximization algorithm is the
idea to augment execution through migrating heavy computation from mobile devices to
resourceful cloud servers and then receive the results from them via wireless networks.
Offloading is an effective way to overcome the resources and functionalities constraints of the
mobile devices since it can release them from intensive processing and increase performance of
the mobile applications, in terms of response time. Offloading brings many potential benefits,
such as energy saving, performance improvement, reliability improvement, ease for the software
developers and better exploitation of contextual information. Parameters about method
transitions, response-times, cost and energy consumptions are dynamically re-estimated at
runtime during application executions.
Read Full Paper
Employee Satisfaction of Safety and Security Measures in Knitted Garment
Apparels Pvt. (Ltd.), Tirupur, (Tamil Nadu, India).
Dr. B. Anitha Rani
J.J. College of Arts & Science(Autonomous)- Pudukkottai
Abstract: Safety and security measures are inevitable in any organization where workers are
involved. An organization’s responsibility to its employees extends beyond the payment of
wages for their services. The employee’s safety and security on and off the job within the
organization is a vital concern for the employer. Providing a safe and healthy environment is a
pre-requisite for any productive effort. Knitted Garment Apparels is a private limited unit, was
one of the leading exporters from Tirupur, since They are now giving the expansion of business
and looking up for new sources. This research deals with the study is on the safety and security
measures provided to the employees at Tirupur Knitted Garment Apparals, Tirupur.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
58
A Study on Work Value Perceptions of Women Employees in Indian Postal
Department with Special Reference to Tamil Nadu State.
DR. K. Gomathi
J.J. College of Arts & Science(Autonomous)- Pudukkottai
Abstract: Women established an identity of their own and created a space for them in education
and work sphere. Educational institutions started training women to enter new arenas enabling
them to move away from traditional roles. Families began expecting women not only to continue
with higher education, but also to pursue any interest they may have in the profession. And,
naturally, after spending so many years in education and obtaining professional degrees, they
became interested in using the knowledge acquired productively. As a result, modern Indian
women have made inroads into different professions that were unthinkable to women in the past.
The number of women in the profession is increasing and they are making substantial progress
toward parity with men. Today, in India, one can find more and more women in familiar as well
as unfamiliar places - as heads of giant organizations, at the controls of aircrafts, in parliament,
in judiciary, as police officers, doctors, engineers, teachers- the list is never ending. By tradition
and throughout history, Indian women were expected to fulfill roles that defined them in relation
to others only, – the kinship identities. But increasingly contemporary women establish
independent identities and move beyond the identities of daughter, wife and mother. The present
study has made an attempt to study the work value perceptions of women employees in Indian
Postal Department.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
59
Novel Clustering based Routing Approach in MANET by Flower Pollination
Algorithm
Karamjeet Kaur, Harpreet Kaur
Rayat Bahra Group of Institutes, Patiala
Abstract: — In this thesis, the extra burden of the nodes that are within the neighborhood of the
base station in a cluster-based network has been modelled as extra virtual member nodes. We
virtually divide the network into regions according to the proximity to the BS denoting the
closest region as the front region and the farthest region as the rear region. The nodes have been
classified according to the region that they fall in. Based on our model, transmission tuning
algorithm for cluster-based WSNs has been proposed to balance the load among cluster heads
that fall in different regions. This algorithm is applied prior to a cluster algorithm to improve the
performance of the clustering algorithm without affection the performance of individual sensor
nodes. As a result, the network lifetime has been prolonged.
Read Full Paper
Golden Ratio Associated with Rogers-Ramanujan Identities
Dr. Vandana N. Purav
P.D. Karkhanis College of Arts and Commerce, Ambarnath
Abstract: Golden ratio Associated with Rogers -Ramanujan Identities Dr. Vandana N. Purav
P.D. Karkhanis College of Arts and Commerce, Ambarnath Email: [email protected]
Abstract Ramanujan was an eminent Indian Mathematician of 20th century. During the years
1903-1914 he discovered most of the mathematical results. In this note, we focus on the results
associated with Rogers- Ramanujan identities of first and second kind and Golden Ratio.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
60
Optimization in Communication Routing: An Introduction to Optimal Control
Kaustav Jyoti Borah, Jutika Borah
Gauhati University, Assam
Abstract: Communication is nothing but transfer of information from source point to destination
point over a medium and coming to Communication Routing it is a process in which to find how
shortest and fastest communication is achieved between the two ends for the Optimization of the
Network. In this paper I would like to discuss about how optimization is achieved in
communication network through the application of information like accuracy, throughput,
latency and mobility support and different protocols followed by networks for the optimized
route. And I will also explain about advantages of network coding in improving the throughput
over routing. Explained how different network algorithms are used for solving optimization
problems in communication routing for example like genetic algorithm used in routing
optimization of optical fiber communication networks. And discussed about Optimizing the
layered communication Protocols.
Read Full Paper
Implementation of Plagiarism Detection Tool in JAVA
Attinderpal Singh
Guru Nanak Dev University, Amritsar
Abstract: With the advent of internet everything that has been researched is available on the
internet. This information can be copied and used as original by someone in their own work
which poses a major challenge for academia and industries like publications. A lot of work has
been done in the field to detect plagiarism in the documents and algorithms have been made. In
this paper, we have implemented porter algorithm for stemming, TF-IDF and cosine similarity to
detect plagiarism
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
61
Efficient Reception of Packets using Zigbee Protocol Wireless Sensor Network
Khursheed Ahmad Rather, Aashish Gagneja, Navjot Kaur
P.E.C., Panchkula, Kurukshetra University
Abstract: The great potential of Wireless Sensor Network is being seen in industrial, consumer
and commercial application. The wireless technology is becoming one of the most prominent
areas of research. With the development of network and communication technology, the WSN
has solved the inconvenience into people’s lives. WSN has good functions of data collection,
transmission, and processing. In the older technology there was a shortcoming of average packet
time delay, large power dissipation, less efficient reception of packets, large propagation delay,
low speed communication. Besides there were other limitations like limited battery life time
nodes incapability of data aggregation, processing, storing and then passing it to the base station
accordingly.. As in the earlier Technologies WSN node based leach protocol could not provide
the above necessary requirements for the system to operate under well adverse environmental
situations. In this dissertation, we have used a ZigBee protocol in WSN system for ensuring that
the nodes may operate for a longer period of time, reducing packet time delay, establishment of a
re-linking algorithm and provides an efficient reception packet and sufficient throughput The
advantage of ZigBee Technology is that it covers a range of 1-100m For comparison purposes,
we have taken the oldest technology i.e. SEP .To allow different systems to work together,
standards are needed. ZigBee/IEEE 802.15.4 protocols are developed for this purpose. Moreover,
ZigBee protocol in WSN has resulted in the low power consumption, enhancement of life time of
battery reduced average packet time delay less power dissipation improved an efficient reception
of packets, reduced propagation delay, high speed communication among wireless
communication devices. On comparing the results of both that is the previous work over which
work has been done earlier and present work it has been observed that modified system performs
better.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
62
A Secure Data Aggregation Mechanism in Wireless Sensor Network
Sandhya Sehrawat, Dr. DINESH SINGH
D.C.R.U.S.T., Murthal, Haryana
Abstract: The addition of mobility in WSN has attracted significant interest in recent years.
Mobile nodes increase the capabilities of the WSN in many ways. We classify mobile wireless
sensor networks (MWSNs) as a special and adaptable class of WSN, in which one or more than
one element of the network is mobile. The mobile component can be any of the sensor nodes,
relays (if any), data collectors or sink or any combination of them. From deployment to data
dissemination, mobility plays an important role in every function of sensor networks. For
example, a mobile node can visit other nodes in the network and gather data directly through
single hop transmissions. Similarly a mobile node can travel around the sensor network and
collect data from sensors, buffer them, and then transfer them to base station. This considerably
reduces only collisions and data losses, and also minimizes the pressure of data forwarding task
by nodes and as a result spreads the energy consumption more consistently throughout the
network. The proposed data aggregation mechanism uses bacterial foraging optimization
algorithm. This technique is inspired by the social foraging behavior like ant colony and particle
swarm optimization. The proposed algorithm improves WSN throughput, collects data more
efficiently, and saves energy.
Read Full Paper
Optimizing Channel Estimation for SCFDMA
Priyanka Malhotra, Garima Saini
Chitkara University, Punjab
Abstract: The third generation partnership project has employed SCFDMA for its uplink
transmission because of its low PAPR. SCFDMA signal while travelling through channel is
affected by noise contained in the channel. Various channel estimation techniques has been given
in the literature. This paper presents a channel estimation based on LMS with its parameters
being optimized using PSO. The paper also compares result with existing LMS algorithm based
systems. It has been observed that the proposed technique provides improvement in Bit Error
Rate as compared to other technique.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
63
Behavior Analysis of OSPF and ISIS Routing Protocols with Service Provider
Network
Vikasdeep Kaur, Harpreet Kaur, Jaspreet Kaur
Bahra Group of Institute, Patiala, Punjab
Abstract: OSPF is mainly designed for IP networks from scratch and runs in almost all sorts of
environments like enterprise, data centers, or service providers, while ISIS, which was mainly
designed by ISO was not intended to run for IP based networks from scratch and IETF in the
early 1990’s adopted ISIS for its advantages. As a scalability purpose ISIS is better than OSPF,
but when we have a large database or a large service provider, with only a single level design
inside the service provider Both the routing protocols have different authentication mechanisms
with ISIS providing key chain based mechanism and provides both plain-text and MD5 based
integration with it, while OSPF also provide MD5 and SHA1 hashing based authentication when
used with IPv6. Multiprotocol label switching technology (MPLS) is used to transfer the data in
service provider network. Apart from Interconnecting Data Centers, L2VPNs are also used for
Inter-AS service provider’s connectivity and connecting various Enterprise Branch offices with
each other. Selection of right L2VPN technology is very important as wrong technology can
harm the network. The main focus of this technique to give the solutions for slow speed, quality
of service, lack of traffic engineer, less security and problem in trouble shouting. The motive is
to improve the speed, high security, easily trouble shoot, high quality in terms of packet
transformation and better results for traffic engineering.
Read Full Paper
Proposed Approach on CSTR with PID
Ramandeep Kaur, Jaspreet Kaur
Chandigarh University
Abstract: In this paper conventional PID controller provides satisfactory results, still inefficiency
persists due to extreme non-linear nature and uncertainty in the dynamics of the plant. So
optimize the pinon linear behavior by Gravitational search algorithm and particle swarm
optimization. The PID controller is the most common form of feedback. PID control issued at the
lowest level; the multivariable controller gives the set points to the controllers at the lower level.
The PID controller can thus be said to be the “bread and butter’ of control engineering. It is an
important component in every control engineer’s tool box. PIDcontrollers have survived many
changes in technology, from mechanics and pneumatics to microprocessors via electronic tubes,
transistors, integrated circuits.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
64
Comparison of State Observer Design Algorithms for DC Servo Motor Systems
Kaustav Jyoti Borah, Jutika Borah
Gauhati University, Assam
Abstract: a state observer is a system that models a real system in order to provide an estimate of
the internal state of the system. The design techniques and comparison of four different types of
state observers are presented in this paper. The considered observers include Luenberge
observer, unknown input observer and sliding mode observer. The application of these observers
to a Multiple Input Multiple Output (MIMO) DC servo motor model and the performance of
observers is assessed. In order to evaluate the effectiveness of these schemes, the simulated
results on the position of DC servo motor in terms of residuals including white noise disturbance
and additive faults are compared.
Read Full Paper
Automated Vehicle Detection and Classification with Probabilistic Neural Network
Ramanpreet Kaur, Meenu Talwar
Chandigarh Group of Colleges, Landran, Chandigarh
Abstract: The number of vehicles in the urban areas is rising at high pace. The critical issues are
arising with the rise in the number of vehicles for the traffic analysis. The analysis of the vehicle
running across the roads is usually done for the density analysis, traffic shaping and many other
similar applications. The vehicle detection in the rushed areas produces the real challenge of
independent component selection and classification, which requires the precise object detector
with deep analytical ability based classification algorithm. In this paper, the unique method with
probabilistic neural network (PNN) classification model along with the non-negative matrix
factorization for the purpose of vehicular object localization and classification in the urban
imagery. The proposed model is expected to solve the problems associated with the accuracy,
precision and recall.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
65
A Review in Cloud Computing Security using Steganography
Ataussamad, Dr. Shiva Prakash
Madan Mohan Malaviya University of Technology, Gorakhpur, U.P.
Abstract: Cloud Computing is a flexible, cost-efficient, and authentic platform for providing
business or consumer IT enabled services on the Internet. However, Cloud computing represents
an added level of risk factors because important and essential services are often outsourced to a
third party connected to cloud network, which makes it even harder to maintain the level of data
security. Steganography is the technique of hiding or encapsulating information in digital media
in order to prevent the existence of information. The digital media with hidden information
within are called stego media and the data without hidden information are called cover media.
Steganography can be used for hiding both the legal as well as illegal information. For example,
civilians can use it for maintaining privacy while the government may use it for the security
reasons of the country. In this paper we have discussed about the various techniques by which
we can enhance the cloud service in relation to security and data privacy.
Read Full Paper
Survey on Dynamic Resource Allocation Schemes in Cloud Environment: A Review
Roshni Singh, Dr. Shiva Prakash
Madan Mohan Malaviya University of Technology, Gorakhpur, U.P.
Abstract: Cloud computing environment provisions the supply of computing resources on the
basis of demand, as and when needed. It builds upon advances of virtualization and distributed
computing to support cost efficient usage of computing resources, emphasizing on resource
scalability and on-demand services. It allows business outcomes to scale up and down their
resources based on needs. Managing the customer demand creates the challenges of on demand
resource allocation. Further they can make use of company-wide access to applications, based on
pay-as-you-go model. Hence there is no need for getting licenses for individual products. Virtual
Machine (VM) technology has been employed for resource provisioning. It is expected that using
virtualized environment will reduce the average job response time as well as executes the task
according to the availability of resources. Effective and dynamic utilization of the resources in
cloud can help to balance the load and avoid situations like slow run of systems. In this paper,
various resource allocation strategies and their challenges are discussed in detail. It is believed
that this paper would benefit both cloud users and researchers in overcoming the challenges
faced.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
66
Detection and Mitigation of Botnet through Machine Learning in MANET
Mariya Ameer, Aashish Gagneja, Navjot Kaur
P.E.C., Panchkula, Kurukshetra University
Abstract: Botnets are the networks of remotely controlled computer systems infected with a
malicious program that allow cybercrimes to control the infected computers or machines without
the user’s knowledge. Botnets are the most ever-growing much interested evolved in the design
of mobile adhoc networks (MANET). A botnet in mobile network is defined as a collection of
nodes containing a malware called mobile malware which are able to bring the different elements
into harmonious activities. Unlike Internet botnets, mobile botnets do not need to propagate
using centralized structure. With the advent of internet and e-commerce application data security
is the most critical issue in transferring the information throughout the internet. Botnets are
emerging as the most significant threat facing computing assets and online ecosystems. The
sharing of information through internet has been the main driver behind the Elite hacker into
criminal activities. Their main target is to steal the vulnerable information from the individuals
or from the organizations. In other words we can say their purpose include the distribution of
spam emails, coordination of distributed denial of service (DDoS) and automatic identity theft.
The proposed method is a classified model in which a Hill Cipher Algorithm and a Support
Vector Machine are combined. A MANET environment with real time datasets is simulated for
testing this model; the packet data of network flow was also collected. The proposed method was
used to identify the critical features that determine the pattern of botnet. The experimental results
indicated that the method can be used for identifying the essential botnet features and that the
performance of the proposed method was superior to that of Artificial Fish Swarm Algorithm.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
67
Protocol Enhancement of Vehicle Collision Avoidance System in Network
Mr. Insha Mushtaq, Aashish Gagneja, Navjot Kaur
P.E.C., Panchkula, Kurukshetra University
Abstract: In most of the automobile system avoiding collision is a critical issue. A “Vehicle
Collision Avoidance System” in an automobile system is a safety system that is designed to
reduce the chances of collision .Collision avoidance is one of the most important issues in
controlling vehicles automatically. The job of driving vehicles can be made easier by the use of
these system, as well as these system ensures to manage the traffic efficiently with road safety. In
this paper we consider a VANET scenario for road side safety and to solve the emergency
situation. To improve the performance for large scale network having large traffic and
communication between vehicles is done by using routing protocol. Here we introduce a PUMA
protocol and compare its results. Also we apply Genetic Algorithm on this protocol for the path
optimization to achieve maximum results. By varying number of vehicles (nodes) mean
throughput, mean delay, jitter, PDR has been calculated. In this paper application and future
scope of VANETs is also introduced.
Read Full Paper
IJARIIT Spectrum – Vol. 2, Issue 6
© 2017, IJARIIT.COM All Rights Reserved
68
Thank You!
www.IJARIIT.com
Encouraging Research
Important Links
Submit Paper Online Author Guidelines
IJARIIT Indexing Call For Papers
Contact Us Current Issue